Publication | Closed Access
In search of usable security: five lessons from the field
129
Citations
11
References
2004
Year
EngineeringUsable SecurityInformation SecurityInformation ForensicsCommunicationWireless SecuritySecure CommunicationSecure Wireless NetworkNetwork SecurityInternet SecuritySecurity ManagementAuthenticationData PrivacyUser ExperienceSecure By DesignNew SystemComputer ScienceGeneral LessonsData SecurityCryptographyPhysical SecuritySecurityTechnologyComputer Security Model
A new system reduces the time to enroll in a secure wireless network by two orders of magnitude, and it also gets high marks for usability and user satisfaction. This article provides a real-world example revealing five general lessons for usable, secure system design.
| Year | Citations | |
|---|---|---|
Page 1
Page 1