CFP last date
20 December 2024
Reseach Article

Security Workers are Users Too: A Novel Framework for Usability

by Mrunmayee Khare, Rajvardhan Oak
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 47
Year of Publication: 2023
Authors: Mrunmayee Khare, Rajvardhan Oak
10.5120/ijca2023922581

Mrunmayee Khare, Rajvardhan Oak . Security Workers are Users Too: A Novel Framework for Usability. International Journal of Computer Applications. 184, 47 ( Feb 2023), 1-4. DOI=10.5120/ijca2023922581

@article{ 10.5120/ijca2023922581,
author = { Mrunmayee Khare, Rajvardhan Oak },
title = { Security Workers are Users Too: A Novel Framework for Usability },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2023 },
volume = { 184 },
number = { 47 },
month = { Feb },
year = { 2023 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number47/32619-2023922581/ },
doi = { 10.5120/ijca2023922581 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:24:10.724655+05:30
%A Mrunmayee Khare
%A Rajvardhan Oak
%T Security Workers are Users Too: A Novel Framework for Usability
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 47
%P 1-4
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security workers are critical components of the security lifecycle. Be it researchers, engineers, content moderators, lawyers, privacy champions, all of them play an important role in keeping users and data safe. Most qualitative research in security-related areas has been user-centric; it has focused on identifying pain points and concerns for end users. Usability and perspectives of security workers have been largely ignored. In this paper, we provide a framework that can be used for worker-centric usability studies. Recognizing that security is a multi-faceted issue (ranging from highly technical aspects like cryptography to human-centric aspects like hate speech), we first develop a taxonomy for security workers based on where they lie on this spectrum and classify them into four levels. Because security as an end-to-end task requires coordination across all levels of workers, simply studying or interviewing workers from one level may produce biased results, and lead researchers to suggest solutions that are not practically possible. In order to address this, we present a novel methodology that can be used for effective qualitative research that can help in identifying not only pain points, but also produce actionable insights across multiple levels of security workers.

References
  1. Michael Bailey, David Dittrich, Erin Kenneally, and Doug Maughan. The menlo report. IEEE Security & Privacy, 10(2):71–75, 2012.
  2. Peter Birmingham and David Wilkinson. Using research instruments: A guide for researchers. Routledge, 2003.
  3. S Gerber Alan and P Green Donald. Field experiments and natural experiments, 2008.
  4. Marc Hassenzahl and Noam Tractinsky. User experiencea research agenda. Behaviour & information technology, 25(2):91–97, 2006.
  5. Kasper Hornbæk. Current practice in measuring usability: Challenges to usability studies and research. International journal of human-computer studies, 64(2):79–102, 2006.
  6. Shagun Jhaver, Sucheta Ghoshal, Amy Bruckman, and Eric Gilbert. Online harassment and content moderation: The case of blocklists. ACM Transactions on Computer-Human Interaction (TOCHI), 25(2):1–33, 2018.
  7. Paul C Jorgensen. Software testing: a craftsman’s approach. Auerbach Publications, 2013.
  8. Shahedul Huq Khandkar. Open coding. University of Calgary, 23:2009, 2009.
  9. Tony Romm. Facebook ads push misinformation about hiv prevention drugs, lgbt activists say,’harming public health’. The Washington Post, pages NA–NA, 2019.
  10. Fred B Schneider. Least privilege and more [computer security]. IEEE Security & Privacy, 1(5):55–59, 2003.
  11. Filipo Sharevski, Adam Trowbridge, and Jessica Westbrook. Novel approach for cybersecurity workforce development: A course in secure design. In 2018 IEEE integrated STEM education conference (ISEC), pages 175–180. IEEE, 2018.
  12. William Stallings. Network and internetwork security: principles and practice. Prentice-Hall, Inc., 1995.
  13. Dafydd Stuttard. Security & obscurity. Network Security, 2005(7):10–12, 2005.
  14. Joshua Uyheng and Kathleen M Carley. Characterizing bot networks on twitter: An empirical analysis of contentious issues in the asia-pacific. In Social, Cultural, and Behavioral Modeling: 12th International Conference, SBP-BRiMS 2019, Washington, DC, USA, July 9–12, 2019, Proceedings 12, pages 153–162. Springer, 2019.
Index Terms

Computer Science
Information Sciences

Keywords

Worker centric usability research taxonomy Cyber security user perspectives Worker usability research Security risks