Principles are based on scientific sources.
Name | Path of Least Resistance |
Sources | (Yee, 2002) |
Synonyms | Reduction (Chiasson et al., 2007) |
Intent | To the greatest extent possible, the natural way to do any task should also be the secure way. |
Motivation | Most users do not spend all their time thinking about security; rather, they are primarily concerned with accomplishing some useful task. It is human nature to be economical with the use of physical and mental effort, and to tend to choose the “path of least resistance”. Sometimes, through the design of our tools, we can make it a little easier to do things safely. |
Examples | None |
Guidelines | Recommendations for improving the design of phishing indicators Usable Crypto APIs |
Tags | Fail Safety, Accessibility, Expectation Conformity |
Log history | [02/14/2016]: Added to repository |
Chiasson, S., Biddle, R., Somayaji, A., 2007. Even Experts Deserve Usable Security: Design guidelines for security management systems, in:.
Yee, K.-P., 2002. User interaction design for secure systems, in: Proceedings of the 4th International Conference on Information and Communications Security, ICICS ’02. Springer-Verlag, London, UK, UK, pp. 278–290.