IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Configuration for Non-Experts: A Case Study in Wireless Network Configuration

Security Configuration for Non-Experts: A Case Study in Wireless Network Configuration
View Sample PDF
Author(s): Cynthia Kuo (Carnegie Mellon University, USA), Adrian Perrig (Carnegie Mellon University, USA)and Jesse Walker (Intel Corporation, USA)
Copyright: 2009
Pages: 17
Source title: Social and Human Elements of Information Security: Emerging Trends and Countermeasures
Source Author(s)/Editor(s): Manish Gupta (State University of New York, USA)and Raj Sharman (State University of New York, USA)
DOI: 10.4018/978-1-60566-036-3.ch011

Purchase

View Security Configuration for Non-Experts: A Case Study in Wireless Network Configuration on the publisher's website for pricing and purchasing information.

Abstract

End users often find that security configuration interfaces are difficult to use. In this chapter, we explore how application designers can improve the design and evaluation of security configuration interfaces. We use IEEE 802.11 network configuration as a case study. First, we design and implement a configuration interface that guides users through secure network configuration. The key insight is that users have a difficult time translating their security goals into specific feature configurations. Our interface automates the translation from users’ high-level goals to low-level feature configurations. Second, we develop and conduct a user study to compare our interface design with commercially available products. We adapt existing user research methods to sidestep common difficulties in evaluating security applications. Using our configuration interface, non-expert users are able to secure their networks as well as expert users. In general, our research addresses prevalent issues in the design and evaluation of consumer-configured security applications.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom