User-Centered Security Applied on Management
The purpose of this study has been to research how to implement a graphical interface for presenting information security information to management. The major conclusion of the study is that management use this kind of information mainly for financial and strategic matters. Hence the information mus...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Linköpings universitet, Institutionen för datavetenskap
2007
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8636 |
id |
ndltd-UPSALLA1-oai-DiVA.org-liu-8636 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-liu-86362013-01-08T13:14:20ZUser-Centered Security Applied on ManagementengBäckström, JohannesLinköpings universitet, Institutionen för datavetenskapInstitutionen för datavetenskap2007User-Centered security management usability interaction designCognitive scienceKognitionsforskningThe purpose of this study has been to research how to implement a graphical interface for presenting information security information to management. The major conclusion of the study is that management use this kind of information mainly for financial and strategic matters. Hence the information must be presented in a way that enhances this use of the information. The study also concludes that people act insecure mainly due to: a) Insufficient knowledge of how/why to act secure. b) The users do not want to act secure due to social and organisational factors. To fight the first factor, the management need a tool that helps them to see where to spend their resources. To fight the second factor, the organisation needs to be well educated and the company culture should allow the users to act secure. Three heuristics for the design of information security solutions for management and a design solution for the interface are also presented in the study. The three heuristics are: 1. Provide overview information very early in the program. The ordinary manager does not have the time or the knowledge to make this overview by himself/herself. 2. Do not overwhelm the user. The ordinary management man/woman is not interested in the details of the information security and/or do not have time to read this sort of information. If he or she wants to access the details, he or she is likely to find them (if they are placed in a logical place). 3. Provide information in a way that is common to the manager. Use wordings that the user understands. Provide contextual help for expressions that must be presented in a technical way. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8636application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
User-Centered security management usability interaction design Cognitive science Kognitionsforskning |
spellingShingle |
User-Centered security management usability interaction design Cognitive science Kognitionsforskning Bäckström, Johannes User-Centered Security Applied on Management |
description |
The purpose of this study has been to research how to implement a graphical interface for presenting information security information to management. The major conclusion of the study is that management use this kind of information mainly for financial and strategic matters. Hence the information must be presented in a way that enhances this use of the information. The study also concludes that people act insecure mainly due to: a) Insufficient knowledge of how/why to act secure. b) The users do not want to act secure due to social and organisational factors. To fight the first factor, the management need a tool that helps them to see where to spend their resources. To fight the second factor, the organisation needs to be well educated and the company culture should allow the users to act secure. Three heuristics for the design of information security solutions for management and a design solution for the interface are also presented in the study. The three heuristics are: 1. Provide overview information very early in the program. The ordinary manager does not have the time or the knowledge to make this overview by himself/herself. 2. Do not overwhelm the user. The ordinary management man/woman is not interested in the details of the information security and/or do not have time to read this sort of information. If he or she wants to access the details, he or she is likely to find them (if they are placed in a logical place). 3. Provide information in a way that is common to the manager. Use wordings that the user understands. Provide contextual help for expressions that must be presented in a technical way. |
author |
Bäckström, Johannes |
author_facet |
Bäckström, Johannes |
author_sort |
Bäckström, Johannes |
title |
User-Centered Security Applied on Management |
title_short |
User-Centered Security Applied on Management |
title_full |
User-Centered Security Applied on Management |
title_fullStr |
User-Centered Security Applied on Management |
title_full_unstemmed |
User-Centered Security Applied on Management |
title_sort |
user-centered security applied on management |
publisher |
Linköpings universitet, Institutionen för datavetenskap |
publishDate |
2007 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8636 |
work_keys_str_mv |
AT backstromjohannes usercenteredsecurityappliedonmanagement |
_version_ |
1716513167104802816 |