Interfacing thought: cognitive aspects of human-computer interaction
CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Usability inspection methods
Usability inspection methods
Safeware: system safety and computers
Safeware: system safety and computers
Human-computer interaction: toward the year 2000
Human-computer interaction: toward the year 2000
The elements of user interface design
The elements of user interface design
Active documentation: wizards as a medium for meeting user needs
SIGDOC '97 Proceedings of the 15th annual international conference on Computer documentation
The design of guided learner-adaptable scaffolding in interactive learning environments
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Helping people find what they don't know
Communications of the ACM
Training wheels in a user interface
Communications of the ACM
Usability Engineering
Little machines: understanding users understanding interfaces
ACM Journal of Computer Documentation (JCD)
User Interaction Design for Secure Systems
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
The Essential Guide to User Interface Design: An Introduction to GUI Design Principles and Techniques
Social connotations of space in the design for virtual communities and social navigation
Designing information spaces
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Social navigation as a model for usable security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Improving user-interface dependability through mitigation of human error
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Security and Usability
Design principles and patterns for computer systems that are simultaneously secure and usable
Design principles and patterns for computer systems that are simultaneously secure and usable
User Interface Design: A Software Engineering Perspective
User Interface Design: A Software Engineering Perspective
Designing Interfaces
Principles of Information Security
Principles of Information Security
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Guidelines for designing IT security management tools
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Revealing hidden context: improving mental models of personal firewall users
Proceedings of the 5th Symposium on Usable Privacy and Security
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
The impact of social navigation on privacy policy configuration
Proceedings of the Sixth Symposium on Usable Privacy and Security
Principles for applying social navigation to collaborative systems
Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology
ROAuth: recommendation based open authorization
Proceedings of the Seventh Symposium on Usable Privacy and Security
Hi-index | 0.00 |
There are a number of security-critical applications such as personal firewalls, web browsers and e-mail clients, whose users have little or no security knowledge and are easily confused, even frustrated by menus, messages or dialog boxes that deal with security issues. While there are evaluations of existing applications and proposals for new approaches or design guidelines for usable security applications, little effort has been invested in determining how applications can help users in security decisions and security tasks. The purpose of this work is to analyse conventional and security-specific user help techniques with regard to their usefulness in supporting lay users in security applications. We analyse the following help techniques: online documentation, context-sensitive help, wizards, assistants, safe staging and social navigation, and complement these with the tempting alternative of built-in, hidden security. Criteria for the analysis are derived from the type of user questions that can arise in applications and from definitions of when a security application can be called usable. Designers of security applications can use our analysis as general recommendations for when and how to use and combine user help techniques in security applications, but they can also use the analysis as a template. They can instantiate the template for their specific application to arrive at a concrete analysis of which user help techniques are most suitable in their specific case.