%0 Conference Proceedings %T What Parts of Usable Security Are Most Important to Users? %+ University of Skövde [Sweden] %+ University of Nottingham, UK (UON) %A Kävrestad, Joakim %A Furnell, Steven %A Nohlberg, Marcus %Z Part 4: End-User Security %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 14th IFIP World Conference on Information Security Education (WISE) %C Virtual, United States %Y Lynette Drevin %Y Natalia Miloslavskaya %Y Wai Sze Leung %Y Suné von Solms %I Springer International Publishing %3 Information Security Education for Cyber Resilience %V AICT-615 %P 126-139 %8 2021-06-22 %D 2021 %R 10.1007/978-3-030-80865-5_9 %K Usability %K Usable security %K Cyber security %K Human %K User %K Perception %Z Computer Science [cs]Conference papers %X The importance of the human aspects of cybersecurity cannot be overstated in light of the many cybersecurity incidents stemming from insecure user behavior. Users are supposed to engage in secure behavior by use of security features or procedures but those struggle to get widespread use and one hindering factor is usability. While several previous papers studied various usability factors in the cybersecurity domain, a common understanding of usable security is missing. Further, usability covers a large range of aspects and understanding what aspects users prioritize is integral for development of truly usable security features. This paper builds on previous work and investigates what usability factors users prioritize and what demographic factors that affects the perception of usability factors. This is done through a survey answered by 1452 respondents from Sweden, Italy and UK. The results show that users prefer security functions to minimize resource consumption in terms of cost, device performance and time. The study further demonstrate that users want security functions to require as little effort as possible and just work. Further, the study determines that nation of residence and IT-competence greatly impacts the perception of usability for security functions while gender and age does so to a much lesser extent. %G English %Z TC 11 %Z WG 11.8 %2 https://inria.hal.science/hal-03739158/document %2 https://inria.hal.science/hal-03739158/file/518181_1_En_9_Chapter.pdf %L hal-03739158 %U https://inria.hal.science/hal-03739158 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WISE %~ IFIP-WG11-8 %~ IFIP-AICT-615