TY - GEN
T1 - Reconciling usability and security
T2 - 19th International Conference on Information Systems Development, ISD 2010
AU - Lang, Michael
PY - 2011
Y1 - 2011
N2 - Usability and security are often portrayed as though they are competing priorities in information systems development. Given that both are essential to the design of an effective system, it is important that these two prerogatives should be reconciled. In recent years, there is growing concern with the rising incidence of on-line impersonation, theft and other types of fraud. It is therefore important that an information system must have a secure and rigorous way of authenticating a user's identity. This paper reviews the sources of literature on interactive design guidance for on-line user authentication, and then compares the actual practices of a purposefully selected sample of twelveWebsites against the recommendations from the literature. Alarmingly, the findings of this study are that manyWebsites have user authentication processes which contain basic design flaws that are potentially open to exploitation by Internet criminals.
AB - Usability and security are often portrayed as though they are competing priorities in information systems development. Given that both are essential to the design of an effective system, it is important that these two prerogatives should be reconciled. In recent years, there is growing concern with the rising incidence of on-line impersonation, theft and other types of fraud. It is therefore important that an information system must have a secure and rigorous way of authenticating a user's identity. This paper reviews the sources of literature on interactive design guidance for on-line user authentication, and then compares the actual practices of a purposefully selected sample of twelveWebsites against the recommendations from the literature. Alarmingly, the findings of this study are that manyWebsites have user authentication processes which contain basic design flaws that are potentially open to exploitation by Internet criminals.
UR - https://www.scopus.com/pages/publications/84881454850
U2 - 10.1007/978-1-4419-9790-6_32
DO - 10.1007/978-1-4419-9790-6_32
M3 - Conference Publication
AN - SCOPUS:84881454850
SN - 9781441996459
T3 - Information Systems Development - Business Systems and Services: Modeling and Development
SP - 397
EP - 416
BT - Information Systems Development - Business Systems and Services
Y2 - 25 August 2010 through 27 August 2010
ER -