Skip to main content

2025 | OriginalPaper | Buchkapitel

MEUSec – Method for Enhancing User Experience and Information Security

verfasst von : Max Sauer, Christoph Becker, Andreas Oberweis, Simon Pfeifer, Jan Sürmeli

Erschienen in: Advances in Mobile Computing and Multimedia Intelligence

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Digital identity wallets enable the management of digital identities and verification documents such as ID cards and driving licences. This data can be stored efficiently in one place on user devices. Research shows that some of the existing digital identity wallets have user experience and information security deficits. Users struggle to understand the concept of digital identity wallets, personal information is often inadequately secured or released to untrusted parties. Moreover, user experience and information security might influence each other negatively. Hence, it is necessary to consider user experience and information security simultaneously, and to evaluate and improve them together. However, existing methods focus on either aspect and do not consider their interplay. In this paper, we present the MEUSec method to facilitate an analysis and improvement of user experience and information security of digital identity wallets.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
3.
Zurück zum Zitat ISO: ISO/IEC 27000:2018(en) Information technology - Security techniques - Information security management systems - Overview and vocabulary (2018) ISO: ISO/IEC 27000:2018(en) Information technology - Security techniques - Information security management systems - Overview and vocabulary (2018)
5.
Zurück zum Zitat Khayretdinova, A., Kubach, M., Sellung, R., Roßnagel, H.: Conducting a usability evaluation of decentralized identity management solutions. In: Friedewald, M., Kreutzer, M., Hansen, M. (eds.) Selbstbestimmung, Privatheit und Datenschutz. D, pp. 389–406. Springer, Wiesbaden (2022). https://doi.org/10.1007/978-3-658-33306-5_19CrossRef Khayretdinova, A., Kubach, M., Sellung, R., Roßnagel, H.: Conducting a usability evaluation of decentralized identity management solutions. In: Friedewald, M., Kreutzer, M., Hansen, M. (eds.) Selbstbestimmung, Privatheit und Datenschutz. D, pp. 389–406. Springer, Wiesbaden (2022). https://​doi.​org/​10.​1007/​978-3-658-33306-5_​19CrossRef
6.
Zurück zum Zitat Korir, M., Parkin, S., Dunphy, P.: An empirical study of a decentralized identity wallet: usability, security, and perspectives on user control. In: Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), pp. 195–211 (2022) Korir, M., Parkin, S., Dunphy, P.: An empirical study of a decentralized identity wallet: usability, security, and perspectives on user control. In: Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), pp. 195–211 (2022)
9.
10.
Zurück zum Zitat Nielsen, J.: Enhancing the explanatory power of usability heuristics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Celebrating Interdependence (CHI 1994), pp. 152–158. ACM Press, Boston (1994). https://doi.org/10.1145/191666.191729 Nielsen, J.: Enhancing the explanatory power of usability heuristics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Celebrating Interdependence (CHI 1994), pp. 152–158. ACM Press, Boston (1994). https://​doi.​org/​10.​1145/​191666.​191729
11.
Zurück zum Zitat Nielsen, J., Molich, R.: Heuristic evaluation of user interfaces. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Empowering People (CHI 1990), pp. 249–256. ACM Press, Seattle (1990). https://doi.org/10.1145/97243.97281 Nielsen, J., Molich, R.: Heuristic evaluation of user interfaces. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Empowering People (CHI 1990), pp. 249–256. ACM Press, Seattle (1990). https://​doi.​org/​10.​1145/​97243.​97281
13.
Zurück zum Zitat Realpe, P.C., Collazos, C.A., Hurtado, J., Granollers, A.: A set of heuristics for usable security and user authentication. In: Proceedings of the 17th International Conference on Human Computer Interaction, pp. 1–8. ACM, Salamanca (2016). https://doi.org/10.1145/2998626.2998662 Realpe, P.C., Collazos, C.A., Hurtado, J., Granollers, A.: A set of heuristics for usable security and user authentication. In: Proceedings of the 17th International Conference on Human Computer Interaction, pp. 1–8. ACM, Salamanca (2016). https://​doi.​org/​10.​1145/​2998626.​2998662
14.
Zurück zum Zitat Rusu, C., Roncagliolo, S., Rusu, V., Collazos, C.: A Methodology to establish usability heuristics. In: Proceedings of the 4th International Conference on Advances in Com-puter-Human Interactions (ACHI 2011) (2011) Rusu, C., Roncagliolo, S., Rusu, V., Collazos, C.: A Methodology to establish usability heuristics. In: Proceedings of the 4th International Conference on Advances in Com-puter-Human Interactions (ACHI 2011) (2011)
15.
Zurück zum Zitat Sartor, S., Sedlmeir, J., Rieger, A., Roth, T.: Love at first sight? a user experience study of self-sovereign identity Wallets. In: Proceedings of the 30th European Conference on Information Systems (ECIS 2022) (2022) Sartor, S., Sedlmeir, J., Rieger, A., Roth, T.: Love at first sight? a user experience study of self-sovereign identity Wallets. In: Proceedings of the 30th European Conference on Information Systems (ECIS 2022) (2022)
17.
Zurück zum Zitat Sauer, M., Alpers, S., Becker, C.: Comparison of methods for analyzing the correlation of user experience and information security. In: Proceedings of the 5th International Conference on Software Engineering and Development (ICSED 2023). ACM, New York (2024). https://doi.org/10.1145/3637792.3637794 Sauer, M., Alpers, S., Becker, C.: Comparison of methods for analyzing the correlation of user experience and information security. In: Proceedings of the 5th International Conference on Software Engineering and Development (ICSED 2023). ACM, New York (2024). https://​doi.​org/​10.​1145/​3637792.​3637794
18.
Zurück zum Zitat Sauer, M., Becker, C., Oberweis, A., Schork, S., Sürmeli, J.: User experience and information security heuristics for digital identity wallets. In: Proceedings of the 8th International Conference on Computer-Human Interaction Research and Applications (CHIRA 2024), Porto, Portugal (2024) Sauer, M., Becker, C., Oberweis, A., Schork, S., Sürmeli, J.: User experience and information security heuristics for digital identity wallets. In: Proceedings of the 8th International Conference on Computer-Human Interaction Research and Applications (CHIRA 2024), Porto, Portugal (2024)
24.
Zurück zum Zitat Wharton, C., Rieman, J., Lewis, C., Polson, P.: The cognitive walkthrough method: a practitioner’s guide. In: Usability Inspection Methods, pp. 105–140. John Wiley & Sons, Inc., Hoboken (1994) Wharton, C., Rieman, J., Lewis, C., Polson, P.: The cognitive walkthrough method: a practitioner’s guide. In: Usability Inspection Methods, pp. 105–140. John Wiley & Sons, Inc., Hoboken (1994)
25.
Zurück zum Zitat Whitten, A., Tygar, J.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th Conference on USENIX Security Symposium, Washington, D.C. (1999) Whitten, A., Tygar, J.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th Conference on USENIX Security Symposium, Washington, D.C. (1999)
Metadaten
Titel
MEUSec – Method for Enhancing User Experience and Information Security
verfasst von
Max Sauer
Christoph Becker
Andreas Oberweis
Simon Pfeifer
Jan Sürmeli
Copyright-Jahr
2025
DOI
https://doi.org/10.1007/978-3-031-78049-3_5