Usable Security

A special issue of Journal of Cybersecurity and Privacy (ISSN 2624-800X). This special issue belongs to the section "Security Engineering & Applications".

Deadline for manuscript submissions: closed (31 August 2024) | Viewed by 2626

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Business and IT, University of Ontario Institute of Technology, Oshawa, ON L1G 0C3, Canada
Interests: adversarial machine learning; security of IoT systems; intrusion detection systems; usable security and insider threat monitoring

Special Issue Information

Dear Colleagues,

System security is often perceived as an obstacle to efficiency because it may slow down the interaction and act as an obstacle to satisfaction, since people are usually annoyed by frequent authentication and acknowledgment requests.

Usability and security are often regarded as competing design goals. Nevertheless, security mechanisms must be usable to be effective: mechanisms that are not used in practice or are used incorrectly provide little or no protection. Without usable security, security cannot be effective.

Indeed, one of the main problems encountered in the area of usable security is the so-called usability/security trade-off. Security pertains to security experts, and they often tend to reject proposals to improve usability because making life easier for the user could facilitate an attack. However, users think about security in terms of goals (i.e., what they need to do to achieve what they want to with their device), and not in terms of keys, certificates, or access control lists.

As a matter of fact, many users do not care much about security mechanisms, such as virus checking or e-mail encryption, or they do not use them in the right way. In fact, they often value usability over security, exposing themselves to greater risks. Users find it difficult to understand the security decisions they are subjected to, so they tend to misconfigure and, thus, jeopardize their security, for example, by disabling or sharing passwords to make it easier to access the system. This is because they often do not know how to use software that is too difficult on first use or do not have the patience to wait for security checks. Wherever possible, functions should be designed to make security implicit by exploiting the user's actions to determine what security operations need to be performed.

With this topic, the attempt is to highlight the issue of usable security by pointing out the differences between the perception of security and the users’ need for usability. Additionally, the intent is to point out that since human behavior is primarily goal-driven, the effective and efficient execution of tasks that help users achieve their goals is a key principle in the design of successful systems. 

Dr. Francesco Di Nocera
Dr. Pooria Madani
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Cybersecurity and Privacy is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • usability
  • security
  • authentication
  • password
  • protection
  • users
  • effectiveness
  • efficiency
  • satisfaction

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

26 pages, 675 KiB  
Article
A Usable Encryption Solution for File-Based Geospatial Data within a Database File System
by Pankajeshwara Sharma, Michael Govorov and Michael Martin
J. Cybersecur. Priv. 2024, 4(2), 298-323; https://doi.org/10.3390/jcp4020015 - 9 May 2024
Viewed by 1460
Abstract
Developing a security solution for spatial files within today’s enterprise Geographical Information System (GIS) that is also usable presents a multifaceted challenge. These files exist in “data silos” of different file server types, resulting in limited collaboration and increased vulnerability. While cloud-based data [...] Read more.
Developing a security solution for spatial files within today’s enterprise Geographical Information System (GIS) that is also usable presents a multifaceted challenge. These files exist in “data silos” of different file server types, resulting in limited collaboration and increased vulnerability. While cloud-based data storage offers many benefits, the associated security concerns have limited its uptake in GIS, making it crucial to explore comparable alternative security solutions that can be deployed on-premise and are also usable. This paper introduces a reasonably usable security solution for spatial files within collaborative enterprise GIS. We explore a Database File System (DBFS) as a potential repository to consolidate and manage spatial files based on its enterprise document management capabilities and security features inherited from the underlying legacy DBMS. These files are protected using the Advanced Encryption Standard (AES) algorithm with practical encryption times of 8 MB per second. The final part focuses on an automated encryption solution with schemes for single- and multi-user files that is compatible with various GIS programs and protocol services. Usability testing is carried out to assess the solution’s usability and focuses on effectiveness, efficiency, and user satisfaction, with the results demonstrating its usability based on the minimal changes it makes to how users work in a collaborative enterprise GIS environment. The solution furnishes a viable means for consolidating and protecting spatial files with various formats at the storage layer within enterprise GIS. Full article
(This article belongs to the Special Issue Usable Security)
Show Figures

Figure 1

Back to TopTop