Usable Security: A Systematic Literature Review
Abstract
:1. Introduction
2. Rationale
- Restrict to academic journal articles, ensuring heightened quality control.
- Examine a substantial timeframe (namely, from 2005 to 2022).
- Encompass studies from diverse research domains rather than confining the scope solely to engineering and computer science.
3. Research Objectives and Research Questions
4. Review Process
- Phase 1. Identification of potential papers that emerged as a result of a literature search on the IEEE and PsycInfo databases;
- Phase 2. Filtering of articles taking into consideration the established inclusion and exclusion criteria (see Section 4.2.1 and Section 4.2.2);
- Phase 3. Detailed review of the articles selected in the previous steps;
- Phase 4. Analysis of the results that emerged during the review and discussion.
4.1. Phase 1: Search Strategy for Identification of Potential Papers
4.1.1. Electronic Databases and Digital Libraries
- IEEE Xplore (https://ieeexplore.ieee.org/ accessed on 1 December 2022) provides Web access to more than five million full-text documents from some of the world’s most cited publications in electrical engineering, computer science, and electronics.
- PsycINFO (https://psycinfo.apa.org/ accessed on 1 December 2022) is a database of abstracts of scholarly journal articles published in all fields of psychology worldwide since the early 1800s. This database contains bibliographic citations, abstracts, cited references, and descriptive information.
4.1.2. Search Procedure
4.2. Phase 2: Study Selection
4.2.1. Inclusion Criteria
- All empirical works related to the relationship between Usability and Security were included;
- The papers included in the research had to use the term Usability, understood as “the extent to which a product can be used by specific users to achieve specific goals with effectiveness, efficiency, and satisfaction in a given context of use” (ISO-9241-11:2018);
- Only papers written in English (British and American) were included.
4.2.2. Exclusion Criteria
- Review articles were not considered;
- All papers written in languages other than English were not included;
- Works that, from an initial reading of the Abstracts and keywords, did not investigate the relationship between Usability or Security were eliminated;
- The word Usability considered as feasibility and/or “use” led to the exclusion of articles in which it was used in this way.
4.3. Phase 3: Detailed Review of the Literature
- Usability of authentication methods;
- Helping security developers improve usability;
- Design strategies for influencing user security behavior;
- Formal models for Usable Security evaluation.
4.4. Phase 4: Analysis and Clustering
4.4.1. Usability of Authentication Methods (34 Papers)
- Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA);
- Alternatives to password;
- Virtual environments;
- Proximity-related attacks;
- Usability evaluation of existing and novel systems.
4.4.2. Helping Security Developers Improve Usability (7 Papers)
- To what extent does the placement of security-related information in the API documentation influence the transmission of this information to developers;
- How they read this documentation, focusing on which elements they paid more attention to through the use of eye-tracking;
- The impact of the presence of cybersecurity instructions (in this case, Content Security Policy—CSP) in the API documentation on the functionality and security of the final product.
4.4.3. Design Strategies for Influencing User Security Behavior (10 Papers)
4.4.4. Formal Models for Usable Security Evaluation (4 Papers)
5. Discussion
- Usability of authentication methods: These articles aim to evaluate the usability of authentication tools, either by assessing them on their own or by comparing them with similar tools. They have been further divided into sub-clusters: CAPTCHA, alternatives to passwords, virtual environments, and proximity-related attacks.
- Helping security developers improve usability: The articles in this category concern studies that aim to provide indications to different types of developers to implement the usability of systems without reducing the level of security.
- Design strategies for influencing user security behavior: The cluster includes studies examining the balance between usability and security in technology usage. The main focus is on individual behavior and the factors influencing the adoption of secure or insecure behaviors. The studies cover various areas, including password-related behaviors, technology literacy, input device usage, app permissions, security indicators, mobile security notifications, and electronic payment systems.
- Formal models for usable security evaluation: The cluster includes articles that have attempted to develop usable security models, either devising a meta-model to align user and designer mental models for system consistency or developing estimation methods for usability and security attributes using fuzzy logic and aggregation techniques (Figure 4).
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Kumar, R.; Khan, A.I.; Abushark, Y.B.; Alam, M.M.; Agrawal, A.; Khan, R.A. An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications. IEEE Access 2020, 8, 50944–50957. [Google Scholar] [CrossRef]
- Steinbart, P.J.; Keith, M.J.; Babb, J. Examining the continuance of secure behavior: A longitudinal field study of mobile device authentication. Inf. Syst. Res. 2016, 27, 219–239. [Google Scholar] [CrossRef]
- Florêncio, D.; Herley, C.; Van Oorschot, P.C. Password Portfolios and the {Finite-Effort} User: Sustainably Managing Large Numbers of Accounts. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, USA, 20–22 August 2014; pp. 575–590. [Google Scholar]
- Al-Ameen, M.N.; Marne, S.T.; Fatema, K.; Wright, M.; Scielzo, S. On improving the memorability of system-assigned recognition-based passwords. Behav. Inf. Technol. 2022, 41, 1115–1131. [Google Scholar] [CrossRef]
- Reuter, C.; Iacono, L.L.; Benlian, A. A quarter century of usable security and privacy research: Transparency, tailorability, and the road ahead. Behav. Inf. Technol. 2022, 41, 2035–2048. [Google Scholar] [CrossRef]
- Distler, V.; Fassl, M.; Habib, H.; Krombholz, K.; Lenzini, G.; Lallemand, C.; Cranor, L.F.; Koenig, V. A systematic literature review of empirical methods and risk representation in usable privacy and security research. ACM Trans. Comput.-Hum. Interact. (TOCHI) 2021, 28, 1–50. [Google Scholar] [CrossRef]
- Gaines, B.R. From facilitating interactivity to managing hyperconnectivity: 50 years of human–computer studies. Int. J. Hum.-Comput. Stud. 2019, 131, 4–22. [Google Scholar] [CrossRef]
- Sae-Bae, N.; Wu, J.; Memon, N.; Konrad, J.; Ishwar, P. Emerging NUI-based methods for user authentication: A new taxonomy and survey. IEEE Trans. Biom. Behav. Identity Sci. 2019, 1, 5–31. [Google Scholar] [CrossRef]
- Lallie, H.S.; Shepherd, L.A.; Nurse, J.R.; Erola, A.; Epiphaniou, G.; Maple, C.; Bellekens, X. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 2021, 105, 102248. [Google Scholar] [CrossRef]
- World Economic Forum. COVID-19 Risks Outlook: A Preliminary Mapping and Its Implications. 2020. Available online: https://www.weforum.org/reports/covid-19-risks-outlook-a-preliminary-mapping-and-itsimplications (accessed on 1 December 2022).
- Lennartsson, M.; Kävrestad, J.; Nohlberg, M. Exploring the meaning of usable security—A literature review. Inf. Comput. Secur. 2021, 29, 647–663. [Google Scholar] [CrossRef]
- Nwokedi, U.O.; Onyimbo, B.A.; Rad, B.B. Usability and security in user interface design: A systematic literature review. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 2016, 8, 72–80. [Google Scholar] [CrossRef]
- Zhang, R.; Xiao, Y.; Sun, S.; Ma, H. Efficient multi-factor authenticated key exchange scheme for mobile communications. IEEE Trans. Dependable Secur. Comput. 2019, 16, 625–634. [Google Scholar] [CrossRef]
- Bicakci, K.; Kiziloz, H.E. Leveraging human computation for pure-text Human Interaction Proofs. Int. J. Hum.-Comput. Stud. 2016, 92, 44–54. [Google Scholar] [CrossRef]
- Nehmadi, L.; Meyer, J. Effects of authentication method and system properties on authentication decisions and performance. J. Cogn. Eng. Decis. Mak. 2015, 9, 130–148. [Google Scholar] [CrossRef]
- Shi, C.; Xu, X.; Ji, S.; Bu, K.; Chen, J.; Beyah, R.; Wang, T. Adversarial captchas. IEEE Trans. Cybern. 2021, 52, 6095–6108. [Google Scholar] [CrossRef]
- Gao, S.; Mohamed, M.; Saxena, N.; Zhang, C. Emerging-image motion captchas: Vulnerabilities of existing designs, and countermeasures. IEEE Trans. Dependable Secur. Comput. 2017, 16, 1040–1053. [Google Scholar] [CrossRef]
- Kiziloz, H.E.; Bicakci, K. A Closer Look at Pure-Text Human-Interaction Proofs. IEEE Trans. Hum.-Mach. Syst. 2016, 47, 994–1004. [Google Scholar] [CrossRef]
- Xu, Y.; Reynaga, G.; Chiasson, S.; Frahm, J.M.; Monrose, F.; Van Oorschot, P.C. Security analysis and related usability of motion-based captchas: Decoding codewords in motion. IEEE Trans. Dependable Secur. Comput. 2013, 11, 480–493. [Google Scholar] [CrossRef]
- Olalere, A.; Feng, J.H.; Lazar, J.; Brooks, T. Investigating the effects of sound masking on the use of audio captchas. Behav. Inf. Technol. 2014, 33, 919–928. [Google Scholar] [CrossRef]
- Yan, J.; El Ahmad, A.S. Breaking visual captchas with naive pattern recognition algorithms. In Proceedings of the Twenty-Third Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, USA, 10–14 December 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 279–291. [Google Scholar]
- Guerar, M.; Migliardi, M.; Merlo, A.; Benmohammed, M.; Palmieri, F.; Castiglione, A. Using screen brightness to improve security in mobile social network access. IEEE Trans. Dependable Secur. Comput. 2016, 15, 621–632. [Google Scholar] [CrossRef]
- Khan, M.A.; Din, I.U.; Jadoon, S.U.; Khan, M.K.; Guizani, M.; Awan, K.A. G-RAT| a novel graphical randomized authentication technique for consumer smart devices. IEEE Trans. Consum. Electron. 2019, 65, 215–223. [Google Scholar] [CrossRef]
- Chiasson, S.; Stobert, E.; Forget, A.; Biddle, R.; Van Oorschot, P.C. Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Trans. Dependable Secur. Comput. 2011, 9, 222–235. [Google Scholar] [CrossRef]
- Biddle, R.; Mannan, M.; van Oorschot, P.C.; Whalen, T. User study, analysis, and usable security of passwords based on digital objects. IEEE Trans. Inf. Forensics Secur. 2011, 6, 970–979. [Google Scholar] [CrossRef]
- Juang, K.; Greenstein, J. Integrating visual mnemonics and input feedback with passphrases to improve the usability and security of digital authentication. Hum. Factors 2018, 60, 658–668. [Google Scholar] [CrossRef] [PubMed]
- Al-Ameen, M.N.; Wright, M. Exploring the potential of geopass: A geographic location-password scheme. Interact. Comput. 2017, 29, 605–627. [Google Scholar] [CrossRef]
- MacRae, B.; Salehi-Abari, A.; Thorpe, J. An exploration of geographic authentication schemes. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1997–2012. [Google Scholar] [CrossRef]
- Zhang, Y.; Han, D.; Li, A.; Zhang, L.; Li, T.; Zhang, Y. Magauth: Secure and usable two-factor authentication with magnetic wrist wearables. IEEE Trans. Mob. Comput. 2021, 22, 311–327. [Google Scholar] [CrossRef]
- Mathis, F.; Williamson, J.H.; Vaniea, K.; Khamis, M. Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing. ACM Trans. Comput.-Hum. Interact. (ToCHI) 2021, 28, 1–44. [Google Scholar] [CrossRef]
- Wazir, W.; Khattak, H.A.; Almogren, A.; Khan, M.A.; Din, I.U. Doodle-based authentication technique using augmented reality. IEEE Access 2020, 8, 4022–4034. [Google Scholar] [CrossRef]
- Li, Y.; Cheng, Y.; Meng, W.; Li, Y.; Deng, R.H. Designing leakage-resilient password entry on head-mounted smart wearable glass devices. IEEE Trans. Inf. Forensics Secur. 2020, 16, 307–321. [Google Scholar] [CrossRef]
- Khamis, M.; Marky, K.; Bulling, A.; Alt, F. User-centred multimodal authentication: Securing handheld mobile devices using gaze and touch input. Behav. Inf. Technol. 2022, 41, 2061–2083. [Google Scholar] [CrossRef]
- Chakraborty, N.; Li, J.Q.; Mondal, S.; Luo, C.; Wang, H.; Alazab, M.; Chen, F.; Pan, Y. On designing a lesser obtrusive authentication protocol to prevent machine-learning-based threats in internet of things. IEEE Internet Things J. 2020, 8, 3255–3267. [Google Scholar] [CrossRef]
- Hartwig, K.; Reuter, C. Nudging users towards better security decisions in password creation using whitebox-based multidimensional visualisations. Behav. Inf. Technol. 2022, 41, 1357–1380. [Google Scholar] [CrossRef]
- Alharbi, A.; Alharbi, T. Design and evaluation of an authentication framework for wearable devices. IEEE Access 2020, 8, 80369–80381. [Google Scholar] [CrossRef]
- Perković, T.; Čagalj, M.; Mastelić, T.; Saxena, N.; Begušić, D. Secure initialization of multiple constrained wireless devices for an unaided user. IEEE Trans. Mob. Comput. 2012, 11, 337–351. [Google Scholar] [CrossRef]
- Leguesse, Y.; Colombo, C.; Vella, M.; Hernandez-Castro, J. PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone. IEEE Access 2021, 9, 168600–168612. [Google Scholar] [CrossRef]
- Ali, M.; Baloch, A.; Waheed, A.; Zareei, M.; Manzoor, R.; Sajid, H.; Alanazi, F. A simple and secure reformation-based password scheme. IEEE Access 2021, 9, 11655–11674. [Google Scholar] [CrossRef]
- Zimmermann, V.; Gerber, N. The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes. Int. J. Hum.-Comput. Stud. 2020, 133, 26–44. [Google Scholar] [CrossRef]
- Weir, C.S.; Douglas, G.; Richardson, T.; Jack, M. Usable security: User preferences for authentication methods in eBanking and the effects of experience. Interact. Comput. 2010, 22, 153–164. [Google Scholar] [CrossRef]
- Flechais, I.; Sasse, M.A. Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science. Int. J. Hum.-Comput. Stud. 2009, 67, 281–296. [Google Scholar] [CrossRef]
- Alsharnouby, M.; Alaca, F.; Chiasson, S. Why phishing still works: User strategies for combating phishing attacks. Int. J. Hum.-Comput. Stud. 2015, 82, 69–82. [Google Scholar] [CrossRef]
- Roth, V.; Straub, T.; Richter, K. Security and usability engineering with particular attention to electronic mail. Int. J. Hum.-Comput. Stud. 2005, 63, 51–73. [Google Scholar] [CrossRef]
- Gorski, P.L.; Möller, S.; Wiefling, S.; Iacono, L.L. “I just looked for the solution!” On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices. IEEE Trans. Softw. Eng. 2021, 48, 3467–3484. [Google Scholar] [CrossRef]
- Dhillon, G.; Oliveira, T.; Susarapu, S.; Caldeira, M. Deciding between information security and usability: Developing value based objectives. Comput. Hum. Behav. 2016, 61, 656–666. [Google Scholar] [CrossRef]
- Alemerien, K. User-friendly security patterns for designing social network websites. Int. J. Technol. Hum. Interact. (IJTHI) 2017, 13, 39–60. [Google Scholar] [CrossRef]
- Merdenyan, B.; Petrie, H. Two studies of the perceptions of risk, benefits and likelihood of undertaking password management behaviours. Behav. Inf. Technol. 2022, 41, 2514–2527. [Google Scholar] [CrossRef]
- Haque, S.T.; Wright, M.; Scielzo, S. Hierarchy of users’ web passwords: Perceptions, practices and susceptibilities. Int. J. Hum.-Comput. Stud. 2014, 72, 860–874. [Google Scholar] [CrossRef]
- Hirschprung, R.S.; Tayro, S.; Reznik, E. Optimising technological literacy acquirement to protect privacy and security. Behav. Inf. Technol. 2022, 41, 922–933. [Google Scholar] [CrossRef]
- Gopavaram, S.R.; Bhide, O.; Camp, L.J. Can You Hear Me Now? Audio and Visual Interactions That Change App Choices. Front. Psychol. 2020, 11, 2227. [Google Scholar] [CrossRef]
- Gates, C.S.; Chen, J.; Li, N.; Proctor, R.W. Effective risk communication for android apps. IEEE Trans. Dependable Secur. Comput. 2013, 11, 252–265. [Google Scholar] [CrossRef]
- Chen, J.; Gates, C.S.; Li, N.; Proctor, R.W. Influence of risk/safety information framing on android app-installation decisions. J. Cogn. Eng. Decis. Mak. 2015, 9, 149–168. [Google Scholar] [CrossRef]
- Wu, D.; Moody, G.D.; Zhang, J.; Lowry, P.B. Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention. Inf. Manag. 2020, 57, 103235. [Google Scholar] [CrossRef]
- Alshamsi, A.; Andras, P. User perception of Bitcoin usability and security across novice users. Int. J. Hum.-Comput. Stud. 2019, 126, 94–110. [Google Scholar] [CrossRef]
- Zhang, J.; Luximon, Y. Interaction design for security based on social context. Int. J. Hum.-Comput. Stud. 2021, 154, 102675. [Google Scholar] [CrossRef]
- Mohamed, M.A.; Chakraborty, J.; Dehlinger, J. Trading off usability and security in user interface design through mental models. Behav. Inf. Technol. 2017, 36, 493–516. [Google Scholar] [CrossRef]
- Al-Zahrani, F.A. Evaluating the usable-security of healthcare software through unified technique of fuzzy logic, ANP and TOPSIS. IEEE Access 2020, 8, 109905–109916. [Google Scholar] [CrossRef]
- Kumar, R.; Baz, A.; Alhakami, H.; Alhakami, W.; Baz, M.; Agrawal, A.; Khan, R.A. A hybrid model of hesitant fuzzy decision-making analysis for estimating usable-security of software. IEEE Access 2020, 8, 72694–72712. [Google Scholar] [CrossRef]
- Di Nocera, F.; Tempestini, G. Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach. J. Cybersecur. Priv. 2022, 2, 245–256. [Google Scholar] [CrossRef]
- Bravo-Lillo, C.; Cranor, L.; Komanduri, S.; Schechter, S.; Sleeper, M. Harder to ignore? Revisiting {Pop-Up} fatigue and approaches to prevent it. In Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS 2014), Menlo Park, CA, USA, 9–11 July 2014; pp. 105–111. [Google Scholar]
- Bravo-Lillo, C.; Komanduri, S.; Cranor, L.F.; Reeder, R.W.; Sleeper, M.; Downs, J.; Schechter, S. Your attention please: Designing security-decision UIs to make genuine risks harder to ignore. In Proceedings of the Ninth Symposium on Usable Privacy and Security, Newcastle, UK, 24–26 July 2013; pp. 1–12. [Google Scholar]
- Bhana, B.; Flowerday, S.V. Usability of the login authentication process: Passphrases and passwords. Inf. Comput. Secur. 2022, 30, 280–305. [Google Scholar] [CrossRef]
- Gutfleisch, M.; Klemmer, J.H.; Busch, N.; Acar, Y.; Sasse, M.A.; Fahl, S. How Does Usable Security (Not) End Up in Software Products? Results from a Qualitative Interview Study. In Proceedings of the 43rd IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, 22–26 May 2022; IEEE: Piscataway, NJ, USA, 2022. [Google Scholar]
Publication Venue | N. Articles |
---|---|
International Journal of Human-Computer Studies | 8 |
Behaviour & Information Technology | 7 |
IEEE Access | 7 |
IEEE Transactions on Dependable and Secure Computing | 6 |
IEEE Transactions on Information Forensics and Security | 3 |
Interacting with Computers | 3 |
Human Factors | 2 |
IEEE Transactions on Consumer Electronics | 2 |
IEEE Transactions on Mobile Computing | 2 |
Journal of Cognitive Engineering and Decision Making | 2 |
International Journal of Technology and Human Interaction | 2 |
ACM Transactions on Computer-Human Interaction | 1 |
Computers in Human Behavior | 1 |
Frontiers in Psychology | 1 |
IEEE Internet of Things Journal | 1 |
IEEE Transactions on Cybernetics | 1 |
IEEE Transactions on Human-Machine Systems | 1 |
IEEE Transactions on Software Engineering | 1 |
Information & Management | 1 |
Information Systems Research | 1 |
International Journal of Human-Computer Interaction | 1 |
International Journal of Mobile Human Computer Interaction | 1 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Di Nocera, F.; Tempestini, G.; Orsini, M. Usable Security: A Systematic Literature Review. Information 2023, 14, 641. https://doi.org/10.3390/info14120641
Di Nocera F, Tempestini G, Orsini M. Usable Security: A Systematic Literature Review. Information. 2023; 14(12):641. https://doi.org/10.3390/info14120641
Chicago/Turabian StyleDi Nocera, Francesco, Giorgia Tempestini, and Matteo Orsini. 2023. "Usable Security: A Systematic Literature Review" Information 14, no. 12: 641. https://doi.org/10.3390/info14120641
APA StyleDi Nocera, F., Tempestini, G., & Orsini, M. (2023). Usable Security: A Systematic Literature Review. Information, 14(12), 641. https://doi.org/10.3390/info14120641