Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Hi-index | 0.00 |
Even though many products can deliver the security needed if used properly, such products cannot succeed if they drive the IT burden too high. The paper explains manageability and usability issues as well as guidelines for producing security products that are easier for IT to manage. The findings reported in this paper are based on qualitative data from structured interviews with IT professionals in 2006 and 2007. Applying a human centered approach to security technologies will help alleviate problems associated with manageability and usability of the application.