Human Factors in Security Research: Lessons Learned from 2008-2018

03/24/2021
by   Mannat Kaur, et al.
0

Instead of only considering technology, computer security research now strives to also take into account the human factor by studying regular users and, to a lesser extent, experts like operators and developers of systems. We focus our analysis on the research on the crucial population of experts, whose human errors can impact many systems at once, and compare it to research on regular users. To understand how far we advanced in the area of human factors, how the field can further mature, and to provide a point of reference for researchers new to this field, we analyzed the past decade of human factors research in security and privacy, identifying 557 relevant publications. Of these, we found 48 publications focused on expert users and analyzed all in depth. For additional insights, we compare them to a stratified sample of 48 end-user studies. In this paper we investigate: (i) The perspective on human factors, and how we can learn from safety science (ii) How and who are the participants recruited, and how this – as we find – creates a western-centric perspective (iii) Research objectives, and how to align these with the chosen research methods (iv) How theories can be used to increase rigor in the communities scientific work, including limitations to the use of Grounded Theory, which is often incompletely applied (v) How researchers handle ethical implications, and what we can do to account for them more consistently Although our literature review has limitations, new insights were revealed and avenues for further research identified.

READ FULL TEXT

page 1

page 7

page 9

page 10

page 11

research
01/04/2021

All Factors Should Matter! Reference Checklist for Describing Research Conditions in Pursuit of Comparable IVR Experiments

A significant problem with immersive virtual reality (IVR) experiments i...
research
08/04/2018

Am I Responsible for End-User's Security? A Programmer's Perspective

Previous research has pointed that software applications should not depe...
research
06/09/2023

SoK: Analysis of User-Centered Studies Focusing on Healthcare Privacy Security

Sensitive information is intrinsically tied to interactions in healthcar...
research
01/26/2023

A Process Model to Improve Information Security Governance in Organisations

Information security governance (ISG) is a relatively new and under-rese...
research
07/30/2022

Cause-and-Effect Analysis of ADAS: A Comparison Study between Literature Review and Complaint Data

Advanced driver assistance systems (ADAS) are designed to improve vehicl...
research
08/27/2022

Information Security Management in High Quality IS Journals: A Review and Research Agenda

In the digital age, the protection of information resources is critical ...
research
03/25/2020

Towards an Insightful Computer Security Seminar

In this paper we describe our experience in designing and evaluating our...

Please sign up or login with your details

Forgot password? Click here to reset