Security user studies: methodologies and best practices

@inproceedings{Egelman2007SecurityUS,
  title={Security user studies: methodologies and best practices},
  author={Serge Egelman and Jennifer King and R. Miller and Nick Ragouzis and E. Poole},
  booktitle={CHI Extended Abstracts},
  year={2007}
}
Interest in usable security -- the research, development, and study of systems that are both usable and secure -- has been growing both in the CHI and information security communities in the past several years. Despite this interest, however, the process of designing and conducting security-related user studies remains extremely difficult. Users deal with security infrequently and irregularly, and most do not notice or care about security until it is missing or broken. Security is rarely a… Expand
19 Citations
Situated Usability Testing for Security Systems
  • 3
  • PDF
The Challenges of Understanding Users' Security-related Knowledge, Behaviour, and Motivations
  • 3
  • PDF
Towards supporting users in assessing the risk in privilege elevation
  • 2
  • PDF
Enhancing research into usable privacy and security
  • 25
Improved User Security Through Graphical Feedback
  • Highly Influenced
  • PDF
Designing user studies for security applications: a case study with wireless network configuration
  • 11
Do windows users follow the principle of least privilege?: investigating user account control practices
  • 81
  • PDF
Smartphone Security: New Applications and Challenges
  • 1
Design, Implementation and Evaluation of an Anti-Phishing Education App
  • 2
  • PDF
...
1
2
...