Perceptions of Beauty in Security Ceremonies

Philosophy and Technology 35 (3):1-34 (2022)
  Copy   BIBTEX

Abstract

When we use secure computer systems, we engage with carefully orchestrated and ordered interactions called “security ceremonies”, all of which exist to assure security. A great deal of attention has been paid to improving the usability of these ceremonies over the last two decades, to make them easier for end-users to engage with. Yet, usability improvements do not seem to have endeared end users to ceremonies. As a consequence, human actors might subvert the ceremony’s processes or avoid engaging with it. Here, we consider whether beautification could be one way of making ceremonies more appealing. To explore beautification in this context, we carried out three studies. Study 1 surveyed 250 participants to derive a wide range of potential dimensions of “beautiful ceremonies”. These statements were sorted into dominant themes and converted into statements, which fed into the second study, with 309 respondents, to reveal the dominant dimensions constituting beauty. Study 3 asked 41 participants to carry out a Q-sort, which revealed the ways that people combine the identified dimensions when characterising security ceremonies as “beautiful”. These studies have allowed us to pin down the perceived dimensions of beauty in the context of security ceremonies, and also to understand how people combine these dimensions in different ways in judging security ceremonies to be beautiful, confirming the old adage of beauty being “in the eye of the beholder”. We conclude by highlighting the constraints imposed by the overarching requirement for security to be maintained in the face of any usability improvements and beautification endeavours.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,611

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Functional Beauty, Perception, and Aesthetic Judgements.Andrea Sauchelli - 2013 - British Journal of Aesthetics 53 (1):41-53.
Beauty.Roger Scruton - 2009 - New York: Oxford University Press.
Beauty.Nick Zangwill - 2003 - In Jerrold Levinson (ed.), Oxford Companion to Aesthetics. Oxford University Press.
Beauty and education.Joe Winston - 2010 - New York: Routledge.
Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Can Faith Be Justified?N. K. Verbin - 2001 - Faith and Philosophy 18 (4):501-522.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Enhancing Dynamic-Content Courses with Student-Oriented Learning Strategies.Ioanna Dionysiou & Despo Ktoridou - 2012 - International Journal of Cyber Ethics in Education 2 (2):24-33.
The Return of Beauty?Wolfgang Welsch - 2004 - Filozofski Vestnik 25 (2).
White Collies, Beauty or Genetic Defect.Margaret Derry - 2018 - Society and Animals 28 (5-6):1-17.
Buddhism, Beauty, and Virtue.David Cooper - 2017 - In Kathleen J. Higgins, Shakti Maira & Sonia Sikka (eds.), Artistic Visions and the Promise of Beauty: Cross-Cultural Perspectives. Springer. pp. 123-138.
Handles for Pentesting Modern Secure Coding: bypassing mobile security.Mourad M. H. Henchiri - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (4):8-15.

Analytics

Added to PP
2022-07-31

Downloads
26 (#615,896)

6 months
20 (#134,822)

Historical graph of downloads
How can I increase my downloads?