• Part of
    Ubiquity Network logo
    Publish with us Cyhoeddi gyda ni

    Read Chapter
  • No readable formats available
  • Aligning Security, Usability, User Experience: A Pattern Approach

    Bilal Naqvi, Jari Porras, Shola Oyedeji, Mehar Ullah

    Chapter from the book: Loizides, F et al. 2020. Human Computer Interaction and Emerging Technologies: Adjunct Proceedings from the INTERACT 2019 Workshops.

     Download
    Buy Paperback

    Security and usability have evolved independently, therefore, expertise in both of these domains are hard to find in one person. This research aims to assist security and usability designers and developers by influencing their decision-making abilities when it comes to the conflicts between security and usability. It does so by proposing the use of usable security patterns for assisting the developers and designers in making accurate choices when handling the conflicts. A novel methodology is presented for identifying usable security patterns from existing implementations, which are effectively managing the security and usability trade-offs. The aim is to identify such implementations while documenting the suitable trade-offs in the format of patterns for use by other developers and designers. To instantiate the methodology, a case study was conducted whose results are also presented in the paper.

    Chapter Metrics:

    How to cite this chapter
    Naqvi, B et al. 2020. Aligning Security, Usability, User Experience: A Pattern Approach. In: Loizides, F et al (eds.), Human Computer Interaction and Emerging Technologies. Cardiff: Cardiff University Press. DOI: https://doi.org/10.18573/book3.aj
    License

    This is an Open Access chapter distributed under the terms of the Creative Commons Attribution 4.0 license (unless stated otherwise), which permits unrestricted use, distribution and reproduction in any medium, provided the original work is properly cited. Copyright is retained by the author(s).

    Peer Review Information

    This book has been peer reviewed. See our Peer Review Policies for more information.

    Additional Information

    Published on May 7, 2020

    DOI
    https://doi.org/10.18573/book3.aj