Security and Usability: Designing Secure Systems That People Can Use
33.2. Usability Guidelines
By looking at the KaZaA network, we surmised that abuses are occurring, and their frequency demonstrates that they are not isolated events. Based on a list of security guidelines provided by Whitten and Tygar,[6] we created a modified list of usability guidelines adapted for peer-to-peer file sharing applications that take into account the unique demands of continuously connected systems that distribute personal files. [6] Whitten and Tygar.
We then conducted a cognitive walkthrough and user study, paying close attention to whether the interface was able to meet these guidelines and, if not, why users were confused. |