Aligning usability and security: a usability study of Polaris
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Adaptive Security Dialogs for Improved Security Behavior of Users
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part I
Proceedings of the Sixth Symposium on Usable Privacy and Security
Data leakage mitigation for discretionary access control in collaboration clouds
Proceedings of the 16th ACM symposium on Access control models and technologies
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings
Proceedings of the Seventh Symposium on Usable Privacy and Security
Hi-index | 0.00 |
Designers are often faced with difficult tradeoffsbetween easing the user's burden by making securitydecisions for them and offering features that ensure thatusers can make the security decisions that are right forthem and their environment. Users often do not understandenough about the impact of a security decision to make aninformed choice. We report on the experience in a 500-person organization on the security of each user's LotusNotes client against unsigned active content. We found thatthe default configuration of the majority of users did notallow unsigned active content to run. However, we foundthat when presented with a choice during their work flow,many of those otherwise secured users would allowunsigned active content to run. We discuss the featuresthat are in Lotus Notes that provide security for activecontent and that respond to the usability issues from thisstudy.