@inproceedings{79a256a4dfc9499fb8f34a13056c27a5,
title = "Shaping our mental model of security",
abstract = "The IT industry{\textquoteright}s need to distinguish new products with new looks, new experiences, and new user interface designs is bad for cybersecurity. It robs users of the chance to transfer previously acquired security-relevant knowledge to new products and leaves them with a poor mental model of security. Starting from a comparison with physical safety, we explore and sketch a method to help users develop a useful mental model of security in cybersystems. A beneficial side-effect of our methodology is that it makes precise what security requirements the user expects the system to fulfill. This can be used to formally verify the system{\textquoteright}s compliance with the user{\textquoteright}s expectation.",
author = "Sa{\v s}a Radomirovi{\'c}",
year = "2020",
doi = "10.1007/978-3-030-57043-9_5",
language = "English",
isbn = "9783030570422",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "51--59",
editor = "Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'a}{\v s}",
booktitle = "Security Protocols XXVII. Security Protocols 2019",
note = "27th International Workshop on Security Protocols 2019, SPW 2019 ; Conference date: 10-04-2019 Through 12-04-2019",
}