Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach
Abstract
:1. Introduction
2. Cybersecurity
- Malware: more commonly known as “computer virus” malware (short for malicious software), means any computer program used to disrupt the operations performed by the user of a computer.
- Ransomware: a type of malware that restricts access to the device it infects, demanding a ransom to remove the restriction. For example, some forms of ransomware lock the system and require the user to pay to unlock the system, while others encrypt the user’s files and require payment to return the encrypted files to plaintext.
- Crypto-jacking: a computer crime that involves the unauthorized use of users’ devices (computers, tablets, servers, smartphones) to produce cryptocurrency. Like many forms of cybercrime, the main reason behind them is profit. Unlike other threats, it is designed to remain completely hidden from the victim.
- Email-related threats: in this category of attacks, we find spoofing, spam, spear phishing, Business Email Compromise (BEC), whaling, smishing, and vishing. All these attacks the same characteristics concerning the exploitation of the weaknesses of human behavior, human habits, and the vulnerability of computer systems to push individuals to become victims of an attack.
- Threats against data: this category includes attacks where a data breach or loss occurs, and sensitive and confidential data ends up in an unprotected/secure environment. Taking over other people’s data is certainly one of the main goals of hackers for many reasons, such as ransomware, defamation, extortion, etc. This type of breach can present in several ways: they can occur due to a deliberate cyber-attack or can involve personal and sensitive data being spread incidentally.
- Threats against availability and integrity: these attacks aim to make information, services, or other relevant resources inaccessible by interrupting the service or overloading the network infrastructure.
- Disinformation and misinformation campaigns: the main difference between these two types is that, the first case refers to the diffusion of false information to intentionally deceive people while; the second case concerns with the dissemination of of misinformation, misleading, inaccurate, or false information is provided without the explicit intention to deceive the reader. These campaigns reduce the general perception of trust and lead people to doubt the veracity of information.
- Non-malicious threats: a malicious user uses authorized software, applications, and protocols to perform malicious activities. This refers to the kind of threat in which the malicious intent is not evident, and the control of the infected device takes place without the need to download malicious files.
- Supply-chain attacks: this involves damaging the weakest elements of the supply chain. The goal is to access source code to create or update mechanisms, infecting apps to spread malware.
3. Usable Security
4. Behavior Analysis: A Primer
- Target behavior: the behavior required for receiving tokens. This behavior must be objective and measurable.
- Token conditioning: the procedure through which the token is conditioned as reinforcement.
- Back-up reinforcement selection: the method by which the activities that can be acquired through the token exchange are identified.
- Token production schedule: schedule of reinforcement through which tokens are released.
- Exchange production schedule: a schedule that defines when tokens can be exchanged for back-up reinforcement.
- Token exchange schedule: schedules that determine the cost of back-up reinforcement in terms of tokens.
5. Discussion and Conclusions
- Will a reduction in the complexity of the interaction represent a reinforcer for the emission of secure behaviors? The answer to this question is not obvious; the reinforcing stimulus is not based on its intrinsic properties but on the modification of the future probability of emitting the behavior. Therefore, it can be defined only post hoc, based on the effect that the consequence has on the behavior.
- Will the implementation of a token economy system be effective in achieving an increase in secure behavior, in the context of cybersecurity, where the individual’s task is to detect suspicious activity during the normal use of technology? The token economy has been used successfully in several fields. There is no reason to rule out that it could show its beneficial effects in the cybersecurity context as well. Of course, this remains to be proven.
- Will the possible beneficial effects of such a program be limited to obtaining tokens, or will they persist after a reinforcement program is completed? In educational contexts in which the token economy has been largely employed, the goal is the generalization of learned behaviors. It is critical to assess whether exposure to a reinforcement program needs follow-up activities to generalize safe behaviors.
- What is the most effective reinforcement schedule to achieve immediate and long-lasting effects? Reinforcement schedules can be based on the amount of behavior produced or the interval required to achieve reinforcement. In addition, they can be fixed or variable. It would be unnecessarily complicated to deepen reinforcement schedules, but it is useful to point out that each type of schedule produces specific effects independently of the organism, the behavior, and the type of reinforcement.
- Will response cost (i.e., punishing insecure behavior) add anything? Reinforcement is a very powerful mechanism, much more than punishment, but the combination of these two strategies is plausible for several practical reasons; encouraging safe driving does not detract from the need to impose fines on those who violate traffic laws.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Conflicts of Interest
References
- Wang, Y.; Rawal, B.; Duan, Q.; Zhang, P. Usability and security go together: A case study on database. In Proceedings of the 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), Tindivanam, India, 3–4 February 2017; IEEE: Washington, DC, USA; pp. 49–54. [Google Scholar]
- Sahar, F. Tradeoffs between usability and security. IACSIT Int. J. Eng. Technol. 2013, 5, 434–437. [Google Scholar] [CrossRef] [Green Version]
- Möller, S.; Ben-Asher, N.; Engelbrecht, K.P.; Englert, R.; Meyer, J. Modeling the behavior of users who are confronted with security mechanisms. Comput. Secur. 2011, 30, 242–256. [Google Scholar] [CrossRef]
- ISO 9241-11:2018; Ergonomics of Human-System Interaction—Part 11: Usability: Definitions and Concepts. International Organization for Standardization: Geneva, Switzerland, 2018.
- Clement, J. Worldwide Digital Population as of January 2020. 2020. Available online: https://www.statista.com/statistics/617136/digital-population-worldwide (accessed on 9 February 2022).
- Azhar, M.; Bhatia, S.; Gagne, G.; Kari, C.; Maguire, J.; Mountrouidou, X.; Yuen, T.T. Securing the human: Broadening diversity in cybersecurity. In Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education, Aberdeen, UK, 15–17 July 2019; pp. 251–252. [Google Scholar]
- ISO/IEC 27032:2012; Information Technology—Security Techniques—Guidelines for Cybersecurity. International Organization for Standardization: Geneva, Switzerland, 2012.
- Von Solms, B.; Von Solms, R. Cybersecurity and information security–what goes where? Inf. Comput. Secur. 2018, 26, 2–9. [Google Scholar] [CrossRef]
- Craigen, D.; Diakun-Thibault, N.; Purse, R. Defining cybersecurity. Technol. Innov. Manag. Rev. 2014, 4, 13–21. [Google Scholar] [CrossRef]
- Oxford University Press. Oxford Online Dictionary; Oxford University Press: Oxford, UK, 2014; Available online: http://www.oxforddictionaries.com/definition/english/Cybersecurity (accessed on 9 February 2022).
- Grobler, M.; Gaire, R.; Nepal, S. User, usage and usability: Redefining human centric cyber security. Front. Big Data 2021, 4, 583723. [Google Scholar] [CrossRef]
- Whitty, M.; Grobler, M.; Janicke, H. Risks, Mitigations and Interventions of Mass Remote Working during the COVID-19 Pandemic; Cyber Security Cooperative Research Centre: Perth, Australia, 2020. [Google Scholar]
- Pranggono, B.; Arabo, A. COVID-19 pandemic cybersecurity issues. Internet Technol. Lett. 2020, 4, e247. [Google Scholar] [CrossRef]
- Hathaway, O.A.; Crootof, R.; Levitz, P.; Nix, H.; Nowlan, A.; Perdue, W.; Spiegel, J. The law of cyber-attack. Calif. Law Rev. 2012, 100, 817–885. [Google Scholar]
- Ben-Asher, N.; Gonzalez, C. Effects of cyber security knowledge on attack detection. Comput. Hum. Behav. 2015, 48, 51–61. [Google Scholar] [CrossRef]
- Goolsby, R.; Shanley, L.; Lovell, A. On Cybersecurity, Crowdsourcing, and Social Cyber-Attack; Office of Naval Research: Arlingotn, VA, USA, 2013. [Google Scholar]
- Uma, M.; Padmavathi, G. A Survey on Various Cyber Attacks and their Classification. Int. J. Netw. Secur. 2013, 15, 390–396. [Google Scholar]
- Lallie, H.S.; Shepherd, L.A.; Nurse, J.R.; Erola, A.; Epiphaniou, G.; Maple, C.; Bellekens, X. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 2021, 105, 102248. [Google Scholar] [CrossRef]
- Shi, F. Threat Spotlight: Coronavirus-Related Phishing; Barracuda Networks: Campbell, CA, USA, 2020; Available online: https://blog.barracuda.com/2020/03/26/threat-spotlight-coronavirus-related-phishing (accessed on 9 February 2022).
- Kumaran, N.; Lugani, S. Protecting Businesses against Cyber Threats during COVID-19 and Beyond. 2020. Available online: https://cloud.google.com/ing-covid-19-and-beyond (accessed on 9 February 2022).
- European Union Agency for Cybersecurity. ENISA Threat Landscape 2021: April 2020 to Mid-July 2021; European Network and Information Security Agency: Athens, Greece, 2021. [Google Scholar]
- Braz, C.; Seffah, A.; M’Raihi, D. Designing a trade-off between usability and security: A metrics based-model. In Proceedings of the IFIP Conference on Human-Computer Interaction, Rio de Janeiro, Brazil, 10–14 September 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 114–126. [Google Scholar]
- Furnell, S. Why users cannot use security. Comput. Secur. 2005, 24, 274–279. [Google Scholar] [CrossRef]
- Gunson, N.; Marshall, D.; Morton, H.; Jack, M. User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Comput. Secur. 2011, 30, 208–220. [Google Scholar] [CrossRef] [Green Version]
- Pfleeger, S.L.; Caputo, D.D. Leveraging behavioral science to mitigate cyber security risk. Comput. Secur. 2012, 31, 597–611. [Google Scholar] [CrossRef]
- Cranor, L.F.; Buchler, N. Better together: Usability and security go hand in hand. IEEE Secur. Priv. 2014, 12, 89–93. [Google Scholar] [CrossRef]
- Seffah, A.; Donyaee, M.; Kline, R.B.; Padda, H.K. Usability measurement and metrics: A consolidated model. Softw. Qual. J. 2006, 14, 159–178. [Google Scholar] [CrossRef]
- Bravo-Lillo, C.; Komanduri, S.; Cranor, L.F.; Reeder, R.W.; Sleeper, M.; Downs, J.; Schechter, S. Your attention please: Designing security-decision UIs to make genuine risks harder to ignore. In Proceedings of the Ninth Symposium on Usable Privacy and Security, Newcastle, UK, 24–26 July 2013; pp. 1–12. [Google Scholar]
- Bravo-Lillo, C.; Cranor, L.; Komanduri, S.; Schechter, S.; Sleeper, M. Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It. In Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS 2014), Menlo Park, CA, USA, 9–11 July 2014; pp. 105–111. [Google Scholar]
- Wash, R.; Rader, E. Prioritizing security over usability: Strategies for how people choose passwords. J. Cybersecur. 2021, 7, 1–17. [Google Scholar] [CrossRef]
- Payne, B.D.; Edwards, W.K. A brief introduction to usable security. IEEE Internet Comput. 2008, 12, 13–21. [Google Scholar] [CrossRef]
- Wash, R.; MacKie-Mason, J.K. Security when people matter: Structuring incentives for user behavior. In Proceedings of the Ninth International Conference on Electronic Commerce, Minneapolis, MN, USA, 19–22 August 2007; pp. 7–14. [Google Scholar]
- Herley, C. So long, and no thanks for the externalities: The rational rejection of security advice by users. In Proceedings of the 2009 Workshop on New Security Paradigms Workshop, Oxford, UK, 8–11 September 2009; pp. 133–144. [Google Scholar]
- Beautement, A.; Coles, R.; Griffin, J.; Ioannidis, C.; Monahan, B.; Pym, D.; Wonham, M. Modelling the human and technological costs and benefits of USB memory stick security. In Managing Information Risk and the Economics of Security; Springer: Boston, MA, USA, 2009; pp. 141–163. [Google Scholar]
- Schultz, E.E.; Proctor, R.W.; Lien, M.-C.; Salvendy, G. Usability and security: An appraisal of usability issues in information security methods. Comput. Secur. 2001, 20, 620–634. [Google Scholar] [CrossRef]
- Lennartsson, M.; Kävrestad, J.; Nohlberg, M. Exploring the meaning of usable security—A literature review. Inf. Comput. Secur. 2021, 29, 647–663. [Google Scholar] [CrossRef]
- Sasse, A. Scaring and bullying people into security won’t work. IEEE Secur. Priv. 2015, 13, 80–83. [Google Scholar] [CrossRef] [Green Version]
- Bai, W.; Kim, D.; Namara, M.; Qian, Y.; Kelley, P.G.; Mazurek, M.L. Balancing security and usability in encrypted email. IEEE Internet Comput. 2017, 21, 30–38. [Google Scholar] [CrossRef]
- Pierce, W.D.; Cheney, C.D. Behavior Analysis and Learning: A Biobehavioral Approach, 6th ed.; Routledge: New York, NY, USA, 2017. [Google Scholar]
- Furnell, S.M.; Bryant, P.; Phippen, A.D. Assessing the security perceptions of personal Internet users. Comput. Secur. 2007, 26, 410–417. [Google Scholar] [CrossRef]
- Schultz, E. The human factor in security. Comput. Secur. 2005, 24, 425–426. [Google Scholar] [CrossRef]
- Deloitte. 2007 Global Security Survey: The Shifting Security Paradigm; Deloitte Touche Tohmatsu: London, UK, 2007. [Google Scholar]
- IBM Security Services 2014 Cyber Security Intelligence Index. Available online: https://media.scmagazine.com/documents/82/ibm_cyber_security_intelligenc_20450.pdf (accessed on 9 February 2022).
- El-Bably, A.Y. Overview of the Impact of Human Error on Cybersecurity based on ISO/IEC 27001 Information Security Management. J. Inf. Secur. Cybercrimes Res. 2021, 4, 95–102. [Google Scholar] [CrossRef]
- Kennison, S.M.; Chan-Tin, E. Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors. Front. Psychol. 2020, 11, 3030. [Google Scholar] [CrossRef]
- Johnston, J.; Eloff, J.H.P.; Labuschagne, L. Security and human computer interfaces. Comput. Secur. 2003, 22, 675–684. [Google Scholar] [CrossRef]
- Eyal, N. Hooked: How to Build Habit-Forming Products; Penguin: London, UK, 2014. [Google Scholar]
- Deterding, S.; Sicart, M.; Nacke, L.; O’Hara, K.; Dixon, D. Gamification. using game-design elements in non-gaming contexts. In CHI’11 Extended Abstracts on Human Factors in Computing Systems; ACM: New York, NY, USA, 2011; pp. 2425–2428. [Google Scholar]
- Ayllon, T.; Azrin, N. The Token Economy: A motivational System for Therapy and Rehabilitation; Appleton-Century-Crofts: New York, NY, USA, 1968. [Google Scholar]
- Glynn, S.M. Token economy approaches for psychiatric patients: Progress and pitfalls over 25 years. Behav. Modif. 1990, 14, 383–407. [Google Scholar] [CrossRef]
- Boniecki, K.A.; Moore, S. Breaking the silence: Using a token economy to reinforce classroom participation. Teach. Psychol. 2003, 30, 224–227. [Google Scholar] [CrossRef]
- Phillips, E.L. Achievement place: Token reinforcement procedures in a home-style rehabilitation setting for “predelinquent” boys 1. J. Appl. Behav. Anal. 1968, 1, 213–223. [Google Scholar] [CrossRef]
- Istiqomah, A.; Widayat, I.W. Social Stories and Token Economy as a Method of Overcoming Off-task Behavior in Teenager with Autism Spectrum Disorder (ASD). In Proceedings of the 3rd International Conference on Psychology in Health, Educational, Social, and Organizational Settings (ICP-HESOS 2018)—Improving Mental Health and Harmony in Global Community, Surabaya, Indonesia, 16–18 November 2018; pp. 34–40. [Google Scholar]
- Hackenberg, T.D. Token reinforcement: A review and analysis. J. Exp. Anal. Behav. 2009, 91, 257–286. [Google Scholar] [CrossRef] [Green Version]
- Kazdin, A.E.; Bootzin, R.R. The token economy: An evaluative review 1. J. Appl. Behav. Anal. 1972, 5, 343–372. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Kadzin, A.E. Single-Case Research Designs: Methods for Clinical and Applied Settings, 3rd ed.; Oxford University Press: Oxford, UK, 2020. [Google Scholar]
- Rivera-Dourado, M.; Gestal, M.; Pazos, A.; Vázquez-Naya, J.M. An Analysis of the Current Implementations Based on the WebAuthn and FIDO Authentication Standards. Eng. Proc. 2021, 7, 56. [Google Scholar]
- Roberts, S.; Geller, S. Principles Of Behavior-Based Safety. In Handbook of Safety Principles; Möller, N., Hansson, S.O., Holmberg, J.E., Rollenhagen, C., Eds.; Jonh Wiley & Sons: New York, NY, USA, 2018; pp. 677–710. [Google Scholar]
- Lebek, B.; Uffen, J.; Neumann, M.; Hohler, B.; Breitner, M.H. Information security awareness and behavior: A theory-based literature review. Manag. Res. Rev. 2014, 37, 1049–1092. [Google Scholar] [CrossRef] [Green Version]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Di Nocera, F.; Tempestini, G. Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach. J. Cybersecur. Priv. 2022, 2, 245-256. https://doi.org/10.3390/jcp2020013
Di Nocera F, Tempestini G. Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach. Journal of Cybersecurity and Privacy. 2022; 2(2):245-256. https://doi.org/10.3390/jcp2020013
Chicago/Turabian StyleDi Nocera, Francesco, and Giorgia Tempestini. 2022. "Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach" Journal of Cybersecurity and Privacy 2, no. 2: 245-256. https://doi.org/10.3390/jcp2020013
APA StyleDi Nocera, F., & Tempestini, G. (2022). Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach. Journal of Cybersecurity and Privacy, 2(2), 245-256. https://doi.org/10.3390/jcp2020013