Usable Security: A Systematic Literature Review

Author:

Di Nocera Francesco1ORCID,Tempestini Giorgia1,Orsini Matteo1

Affiliation:

1. Department of Planning, Design, and Technology of Architecture, Sapienza University of Rome, 00196 Rome, Italy

Abstract

Usable security involves designing security measures that accommodate users’ needs and behaviors. Balancing usability and security poses challenges: the more secure the systems, the less usable they will be. On the contrary, more usable systems will be less secure. Numerous studies have addressed this balance. These studies, spanning psychology and computer science/engineering, contribute diverse perspectives, necessitating a systematic review to understand strategies and findings in this area. This systematic literature review examined articles on usable security from 2005 to 2022. A total of 55 research studies were selected after evaluation. The studies have been broadly categorized into four main clusters, each addressing different aspects: (1) usability of authentication methods, (2) helping security developers improve usability, (3) design strategies for influencing user security behavior, and (4) formal models for usable security evaluation. Based on this review, we report that the field’s current state reveals a certain immaturity, with studies tending toward system comparisons rather than establishing robust design guidelines based on a thorough analysis of user behavior. A common theoretical and methodological background is one of the main areas for improvement in this area of research. Moreover, the absence of requirements for Usable security in almost all development contexts greatly discourages implementing good practices since the earlier stages of development.

Publisher

MDPI AG

Subject

Information Systems

Reference64 articles.

1. An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications;Kumar;IEEE Access,2020

2. Examining the continuance of secure behavior: A longitudinal field study of mobile device authentication;Steinbart;Inf. Syst. Res.,2016

3. Florêncio, D., Herley, C., and Van Oorschot, P.C. (2014, January 20–22). Password Portfolios and the {Finite-Effort} User: Sustainably Managing Large Numbers of Accounts. Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, USA.

4. On improving the memorability of system-assigned recognition-based passwords;Marne;Behav. Inf. Technol.,2022

5. A quarter century of usable security and privacy research: Transparency, tailorability, and the road ahead;Reuter;Behav. Inf. Technol.,2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3