{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T20:29:04Z","timestamp":1772656144147,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T00:00:00Z","timestamp":1506297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,25]]},"DOI":"10.1145\/3123818.3123838","type":"proceedings-article","created":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T12:51:09Z","timestamp":1507812669000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Design process for usable security and authentication using a user-centered approach"],"prefix":"10.1145","author":[{"given":"Paulo","family":"Realpe-Mu\u00f1oz","sequence":"first","affiliation":[{"name":"Instituci\u00f3n Universitaria Antonio Jos\u00e9, Camacho - Cali, Colombia"}]},{"given":"C\u00e9sar A.","family":"Collazos","sequence":"additional","affiliation":[{"name":"Universidad del Cauca, Popay\u00e1n, Colombia"}]},{"given":"Toni","family":"Granollers","sequence":"additional","affiliation":[{"name":"Universidad de Lleida, Lleida, Spain"}]},{"given":"Jaime","family":"Mu\u00f1oz-Arteaga","sequence":"additional","affiliation":[{"name":"Universidad Aut\u00f3noma de Aguascalientes, Aguascalientes, M\u00e9xico"}]},{"given":"Eduardo B.","family":"Fernandez","sequence":"additional","affiliation":[{"name":"Florida Atlantic University"}]}],"member":"320","published-online":{"date-parts":[[2017,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"332","volume-title":"A conceptual framework for evaluating usable security in authentication mechanisms usability perspectives,\" in 5th International Conference on Network and System Security (NSS)","author":"Mihajlov M.","year":"2011","unstructured":"M. Mihajlov , S. Josimovski , and B. Blazic , \" A conceptual framework for evaluating usable security in authentication mechanisms usability perspectives,\" in 5th International Conference on Network and System Security (NSS) , 2011 , pp. 332 -- 336 . M. Mihajlov, S. Josimovski, and B. Blazic, \"A conceptual framework for evaluating usable security in authentication mechanisms usability perspectives,\" in 5th International Conference on Network and System Security (NSS), 2011, pp. 332--336."},{"key":"e_1_3_2_1_2_1","first-page":"114","article-title":"Designing a trade-off between usability and security: A metrics based-model","volume":"4663","author":"Braz C.","year":"2007","unstructured":"C. Braz , A. Seffah , and D. M Raihi , \" Designing a trade-off between usability and security: A metrics based-model ,\" Human-Computer Interaction-INTERACT , vol. 4663 , pp. 114 -- 126 , 2007 . C. Braz, A. Seffah, and D. MRaihi, \"Designing a trade-off between usability and security: A metrics based-model,\" Human-Computer Interaction-INTERACT, vol. 4663, pp. 114--126, 2007.","journal-title":"Human-Computer Interaction-INTERACT"},{"key":"e_1_3_2_1_3_1","volume-title":"ACM","author":"Chiasson S.","year":"2007","unstructured":"S. Chiasson , R. Biddle , and A. Somayaji , \" Even experts deserve usable security: Design guidelines for security management systems,\" in Workshop on Usable IT Security Management (SOUPS '07) . ACM , 2007 . S. Chiasson, R. Biddle, and A. Somayaji, \"Even experts deserve usable security: Design guidelines for security management systems,\" in Workshop on Usable IT Security Management (SOUPS '07). ACM, 2007."},{"key":"e_1_3_2_1_4_1","first-page":"75","volume-title":"User interface requirements for authentication of communication,\" in Fourth Australasian user interface conference on User interfaces","author":"J\u00f8sang A.","year":"2003","unstructured":"A. J\u00f8sang and M. Patton , \" User interface requirements for authentication of communication,\" in Fourth Australasian user interface conference on User interfaces , vol. 18 , 2003 , pp. 75 -- 80 . A. J\u00f8sang and M. Patton, \"User interface requirements for authentication of communication,\" in Fourth Australasian user interface conference on User interfaces, vol. 18, 2003, pp. 75--80."},{"key":"e_1_3_2_1_5_1","first-page":"155","volume-title":"AHFE","author":"Braz C.","year":"2014","unstructured":"C. Braz , A. Seffah , and P. Poirier , \" Designing usable, yet secure user authentication services: A user authentication protocol,\" in 5th International Conference on Applied Human Factors and Ergonomics, vol. 20 . AHFE , July 2014 , pp. 155 -- 165 . C. Braz, A. Seffah, and P. Poirier, \"Designing usable, yet secure user authentication services: A user authentication protocol,\" in 5th International Conference on Applied Human Factors and Ergonomics, vol. 20. AHFE, July 2014, pp. 155--165."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.013589"},{"key":"e_1_3_2_1_8_1","volume-title":"NordU2002 - The 4th EurOpen\/USENIX Conference","author":"Markotten D.","year":"2002","unstructured":"D. Markotten , \"User-centered security engineering,\" in NordU2002 - The 4th EurOpen\/USENIX Conference , 2002 . D. Markotten, \"User-centered security engineering,\" in NordU2002 - The 4th EurOpen\/USENIX Conference, 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.v12:3"},{"key":"e_1_3_2_1_10_1","first-page":"236","volume-title":"Integrating security and usability at requirement specification process","author":"Parveen N.","year":"2014","unstructured":"N. Parveen , R. Beg , and H. Khan , \" Integrating security and usability at requirement specification process ,\" vol. 10 , pp. 236 -- 240 , 2014 . N. Parveen, R. Beg, and H. Khan, \"Integrating security and usability at requirement specification process,\" vol. 10, pp. 236--240, 2014."},{"key":"e_1_3_2_1_11_1","volume-title":"Tech. Rep.","author":"Collett L.","year":"2003","unstructured":"L. Collett , \"Designing usable security for effective security,\" Duke University , Tech. Rep. , 2003 . L. Collett, \"Designing usable security for effective security,\" Duke University, Tech. Rep., 2003."},{"key":"e_1_3_2_1_12_1","volume-title":"Reliability and Security","author":"Kainda R.","year":"2010","unstructured":"R. Kainda , I. Flechais , and A. Roscoe , \" Security and usability: Analysis and evaluation,\" in 2010 International Conference on Availability , Reliability and Security , 2010 . R. Kainda, I. Flechais, and A. Roscoe, \"Security and usability: Analysis and evaluation,\" in 2010 International Conference on Availability, Reliability and Security, 2010."},{"key":"e_1_3_2_1_13_1","volume-title":"Usability and security by design: A case study in research and development,\" in Network and Distributed System Security (NDSS) Symposium","author":"Faily S.","year":"2015","unstructured":"S. Faily , J. Lyle , I. Flechais , and A. Simpson , \" Usability and security by design: A case study in research and development,\" in Network and Distributed System Security (NDSS) Symposium , 2015 . S. Faily, J. Lyle, I. Flechais, and A. Simpson, \"Usability and security by design: A case study in research and development,\" in Network and Distributed System Security (NDSS) Symposium, 2015."},{"key":"e_1_3_2_1_14_1","volume-title":"Dise\u00f1o de sistemas interactivos centrados en el usuario","author":"Granollers T.","year":"2005","unstructured":"T. Granollers , J. Lor\u00e9s , and J. Ca\u00f1as , Dise\u00f1o de sistemas interactivos centrados en el usuario , E. Media, Ed. Editorial UAO , 2005 . T. Granollers, J. Lor\u00e9s, and J. Ca\u00f1as, Dise\u00f1o de sistemas interactivos centrados en el usuario, E. Media, Ed. Editorial UAO, 2005."},{"key":"e_1_3_2_1_15_1","unstructured":"U. Holmstrom \"User-centered design of security software \" 1999.  U. Holmstrom \"User-centered design of security software \" 1999."},{"issue":"12","key":"e_1_3_2_1_16_1","article-title":"A trade-off model of software requirements for balancing between security and usability issues","volume":"10","author":"Al-Sarayreh K.","year":"2016","unstructured":"K. Al-Sarayreh , L. Hasan , and K. Almakadmeh , \" A trade-off model of software requirements for balancing between security and usability issues ,\" International Review on Computers and Software , vol. 10 , no. 12 , 2016 . K. Al-Sarayreh, L. Hasan, and K. Almakadmeh, \"A trade-off model of software requirements for balancing between security and usability issues,\" International Review on Computers and Software, vol. 10, no. 12, 2016.","journal-title":"International Review on Computers and Software"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638404.2638483"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.08.008"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.06.328"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.206"},{"key":"e_1_3_2_1_21_1","unstructured":"J. Jurjens \"Secure Systems Development with UML\". Springer 2005.   J. Jurjens \"Secure Systems Development with UML\". Springer 2005."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-642-39473-7_23","volume-title":"Towards usable and secure natural language processing systems,\" in HCI International 2013--Posters Extended Abstracts","author":"Hausawi Y.","year":"2013","unstructured":"Y. Hausawi and L. Mayron , \" Towards usable and secure natural language processing systems,\" in HCI International 2013--Posters Extended Abstracts , 2013 , pp. 109 -- 113 . Y. Hausawi and L. Mayron, \"Towards usable and secure natural language processing systems,\" in HCI International 2013--Posters Extended Abstracts, 2013, pp. 109 -- 113."},{"key":"e_1_3_2_1_24_1","volume-title":"The ISDF framework: Integrating security patterns and best practices,\" in International Conference on Information Security and Assurance","author":"Alkussayer A.","year":"2009","unstructured":"A. Alkussayer and W. Allen , \" The ISDF framework: Integrating security patterns and best practices,\" in International Conference on Information Security and Assurance , 2009 . A. Alkussayer and W. Allen, \"The ISDF framework: Integrating security patterns and best practices,\" in International Conference on Information Security and Assurance, 2009."},{"key":"e_1_3_2_1_25_1","volume-title":"IT Security: Concepts, Procedures and Protocols","author":"Eckert C.","year":"2011","unstructured":"C. Eckert , IT Security: Concepts, Procedures and Protocols . Oldenbourg Wissenscha Vsverlag , 2011 . C. Eckert, IT Security: Concepts, Procedures and Protocols. Oldenbourg Wissenscha Vsverlag, 2011."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.10.001"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02343-9","volume-title":"Usable Security: History, Themes, and Challenges","author":"Garfinkel S.","year":"2014","unstructured":"S. Garfinkel and H. Lipford , Usable Security: History, Themes, and Challenges , E. Bertino and R. Sandhu, Eds. Morgan & Claypool , 2014 . S. Garfinkel and H. Lipford, Usable Security: History, Themes, and Challenges, E. Bertino and R. Sandhu, Eds. Morgan & Claypool, 2014."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"K. P. Yee \"User interaction design for secure systems \" in 4th International Conference on Information and Communications Security 2002.   K. P. Yee \"User interaction design for secure systems \" in 4th International Conference on Information and Communications Security 2002.","DOI":"10.1007\/3-540-36159-6_24"},{"key":"e_1_3_2_1_29_1","volume-title":"Why johnny can't encrypt: A usability evaluation of PGP 5.0,\" in The 9th USENIX Security Symposium","author":"Whitten A.","year":"1999","unstructured":"A. Whitten and J. Tygar , \" Why johnny can't encrypt: A usability evaluation of PGP 5.0,\" in The 9th USENIX Security Symposium , 1999 . A. Whitten and J. Tygar, \"Why johnny can't encrypt: A usability evaluation of PGP 5.0,\" in The 9th USENIX Security Symposium, 1999."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2012.11.003"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998626.2998662"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39381-0_7"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/189200"}],"event":{"name":"Interacci\u00f3n '17: XVIII International Conference on Human Computer Interaction","location":"Cancun Mexico","acronym":"Interacci\u00f3n '17"},"container-title":["Proceedings of the XVIII International Conference on Human Computer Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3123818.3123838","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3123818.3123838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:27Z","timestamp":1750273527000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3123818.3123838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,25]]},"references-count":31,"alternative-id":["10.1145\/3123818.3123838","10.1145\/3123818"],"URL":"https:\/\/doi.org\/10.1145\/3123818.3123838","relation":{},"subject":[],"published":{"date-parts":[[2017,9,25]]},"assertion":[{"value":"2017-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}