Shaping our mental model of security

Saša Radomirović*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

83 Downloads (Pure)

Abstract

The IT industry’s need to distinguish new products with new looks, new experiences, and new user interface designs is bad for cybersecurity. It robs users of the chance to transfer previously acquired security-relevant knowledge to new products and leaves them with a poor mental model of security. Starting from a comparison with physical safety, we explore and sketch a method to help users develop a useful mental model of security in cybersystems. A beneficial side-effect of our methodology is that it makes precise what security requirements the user expects the system to fulfill. This can be used to formally verify the system’s compliance with the user’s expectation.

Original languageEnglish
Title of host publicationSecurity Protocols XXVII. Security Protocols 2019
EditorsJonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyáš
PublisherSpringer
Pages51-59
Number of pages9
ISBN (Electronic)9783030570439
ISBN (Print)9783030570422
DOIs
Publication statusPublished - 2020
Event27th International Workshop on Security Protocols 2019 - Cambridge, United Kingdom
Duration: 10 Apr 201912 Apr 2019

Publication series

NameLecture Notes in Computer Science
Volume12287
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference27th International Workshop on Security Protocols 2019
Abbreviated titleSPW 2019
Country/TerritoryUnited Kingdom
CityCambridge
Period10/04/1912/04/19

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Shaping our mental model of security'. Together they form a unique fingerprint.

Cite this