ing that the beauty of a ceremony does not come at
the expense of its security (which might be the case
for some of the ceremonies we considered, e.g., if
users choose weak passwords), but instead provably
reinforces its security. We expect that this will ulti-
mately lead to defining criteria that formalise when
beautification preserves or reinforces security.
REFERENCES
Banfield, J. M. (2016). A Study of Information Security
Awareness Program Effectiveness in Predicting End-
User Security Behavior. PhD thesis, Eastern Michigan
University.
Bella, G. and Coles-Kemp, L. (2012). Layered analysis of
security ceremonies. In 27th IFIP TC 11 Informa-
tion Security and Privacy Conference, pages 273–286.
Springer.
Bella, G. and Vigan
`
o, L. (2015). Security is Beautiful.
In Security Protocols XXIII, Revised Selected Papers,
LNCS 9379, pages 247–250. Springer.
Blythe, J., Koppel, R., and Smith, S. W. (2013). Circum-
vention of security: Good users do bad things. IEEE
Security & Privacy, 11(5):80–83.
Burr, W. E., Dodson, D. F., and Polk, W. T. (2004). NIST
special publication 800-63. Electronic Authentication
Guideline https://pages.nist.gov/800-63-3/.
Carritt, E. F. (1932). What is Beauty? Clarendon Press.
Chen, J., Kanj, I. A., and Xia, G. (2005). Simplicity
is beauty: Improved upper bounds for vertex cover.
Manuscript communicated by email.
Clark, S., Goodspeed, T., Metzger, P., Wasserman, Z., Xu,
K., and Blaze, M. (2011). Why (Special Agent)
Johnny (Still) Can’t Encrypt: A Security Analysis of
the APCO Project 25 Two-Way Radio System. In
USENIX Security Symposium, pages 8–12.
Cranor, L. F. and Garfinkel, S. (2005). Security and us-
ability: designing secure systems that people can use.
O’Reilly Media, Inc.
Ellison, C. M. (2007). Ceremony design and analysis. IACR
Cryptology ePrint Archive, 2007:399.
Erickson, M. (2011). Beautiful Mathematics. The Mathe-
matical Association of America.
Gelernter, D. H. (1998). Machine Beauty: Elegance and the
Heart of Technology. Perseus Books, L.L.C.
Glynn, I. (2010). Elegance in science: the beauty of sim-
plicity. Oxford University Press.
Grassi, P. A., Fenton, J. L., Newton, E. M., Perlner,
R. A., Regenscheid, A. R., Burr, W. E., and Richer,
J. P. (2017). NIST special publication 800-63.
https://pages.nist.gov/800-63-3/sp800-63b.html.
Hassenzahl, M. and Monk, A. (2010). The inference of
perceived usability from beauty. Human–Computer
Interaction, 25(3):235–260.
Karlof, C., Tygar, J. D., and Wagner, D. (2009).
Conditioned-safe ceremonies and a user study of an
application to web authentication. In SOUPS. ACM
Press.
Karvonen, K. (2000). The beauty of simplicity. In CUU,
pages 85–90. ACM Press.
Kennedy, S. E. and Kennedy, S. E. (2016). The pathway to
security–mitigating user negligence. Information &
Computer Security, 24(3):255–264.
Martina, J. E., dos Santos, E., Carlos, M. C., Price, G., and
Cust
´
odio, R. F. (2015). An adaptive threat model for
security ceremonies. INT J INF SECUR, 14:103–121.
McMillan, R. (2017). The Man Who Wrote
Those Password Rules Has a New Tip.
https://www.wsj.com/articles/the-man-who-wrote-
those-password-rules-has-a-new-tip-n3v-r-m1-d-
1502124118.
Nass, C., Isbister, K., and Lee, E.-J. (2000). Truth is beauty:
Researching embodied conversational agents. In Em-
bodied Conversational Agents, pages 374–402.
Pancake, C. (2001). The ubiquitous beauty of user-aware
software. Commun. ACM, 44(3):130–130.
Peppa (2010). Peppa Pig, Series 3, Episode 38,
“The Secret Club”. https://www.youtube.com/
watch?v=uDV2VdeNLnQ.
Portanova, M. S. (1975). Music is beauty. The Black Per-
spective in Music, 3(2):196–198.
Radke, K., Boyd, C., Nieto, J. M. G., and Brereton, M.
(2011). Ceremony analysis: Strengths and weak-
nesses. In 26th IFIP SEC, LNCS 354, pages 104–115.
Springer.
Reber, R., Schwarz, N., and Winkielman, P. (2004). Pro-
cessing fluency and aesthetic pleasure: Is beauty in
the perceiver’s processing experience? Personality
and social psychology review, 8(4):364–382.
Russell, B. (1956). The Autobiography of Bertrand Russell.
George Allen & Unwin.
Schechter, S., Brush, A. B., and Egelman, S. (2009). It’s
no secret. measuring the security and reliability of au-
thentication via secret questions. In 30th IEEE Sym-
posium on Security and Privacy, pages 375–390.
Sheng, S., Broderick, L., Koranda, C. A., and Hyland, J. J.
(2006). Why Johnny still can’t encrypt: evaluating
the usability of email encryption software. In SOUPS,
pages 3–4, ACM Press.
Stajano, F. (2011). Pico: No more passwords! In Secu-
rity Protocols Workshop, LNCS 7114, pages 49–81.
Springer.
Subashini, K. and Sumithra, G. (2014). Secure multimodal
mobile authentication using one time password. In
ICCTET, pages 151–155. IEEE CS Press.
Tatarkiewicz, W. (2006). History of Aesthetics: Edited by
J. Harrell, C. Barrett and D. Petsch. A&C Black.
Yildirim, E. (2016). The importance of information security
awareness for the success of business enterprises. In
Advances in Human Factors in Cybersecurity, pages
211–222. AISC, volume 501.
SECRYPT 2019 - 16th International Conference on Security and Cryptography
136