Show simple item record

dc.contributor.authorNaqvi, B
dc.contributor.authorClarke, Nathan
dc.contributor.authorPorras, J
dc.date.accessioned2020-07-08T14:44:57Z
dc.date.issued2020-08-12
dc.identifier.issn2056-4961
dc.identifier.issn2056-497X
dc.identifier.urihttp://hdl.handle.net/10026.1/15853
dc.description.abstract

<jats:sec> <jats:title content-type="abstract-subheading">Purpose</jats:title> <jats:p>The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been formulated while considering key concerns raised after conducting a series of interviews with practitioners from the industry. The framework is aimed at assisting system designers and developers in making reasonably accurate choices when it comes to the trade-offs between security and usability. The outcomes of using the framework are documented as design patterns, which are disseminated among the community of system designers and developers for use in other but similar contexts.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Design/methodology/approach</jats:title> <jats:p>A design science research approach was used to develop the integrative framework for usable security. Interviews were conducted for identification of the key concerns; however, the framework was validated during a workshop. Moreover, to validate the patterns’ template and the usable security pattern identified after instantiating the framework, a survey instrument was used.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Findings</jats:title> <jats:p>It is important to consider the usability aspect in the development of security systems; otherwise, the systems, despite being secure against attacks, would be susceptible to user mistakes leading to compromises. It is worthwhile to handle usable security concerns right from the start of system development life cycle. Design patterns can help the developers in assessing the usability of their security options.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Practical implications</jats:title> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Practical implications</jats:title> <jats:p>The framework would assist the designers and developers in handling the security and usability conflicts right from the start of the system development life cycle. The patterns documented after using the framework would help not only the designers and developers working in the industry but also freelancers.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Originality/value</jats:title> <jats:p>The authors present a novel framework to handle the security and usability conflicts during the system development life cycle. The development process of the framework was driven by the concerns raised after a series of interviews with the practitioners from industry. The framework presented in this paper was validated during a workshop in which it was exposed for review and comments by the participants from the industry. To demonstrate the use of patterns in general and the framework in particular, a case study featuring smart grids from the domain of cyber-physical systems is presented, which (to the best of the authors’ knowledge) features the first work relevant to usable security in the domain of cyber-physical systems.</jats:p> </jats:sec>

dc.format.extent49-72
dc.languageen
dc.language.isoen
dc.publisherEmerald
dc.subjectGeneric health relevance
dc.titleIncorporating the Human Facet of Security in Developing Systems and Services
dc.typejournal-article
dc.typeJournal Article
plymouth.issue1
plymouth.volume29
plymouth.publication-statusPublished
plymouth.journalInformation and Computer Security
dc.identifier.doi10.1108/ICS-11-2019-0130
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2020-07-08
dc.rights.embargodate2020-8-15
dc.identifier.eissn2056-497X
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1108/ICS-11-2019-0130
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2020-08-12
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV