Perceptions of beauty in security ceremonies

Bella, Giampaolo and Ophoff, Jacques and Renaud, Karen and Sempreboni, Diego and Viganò, Luca (2022) Perceptions of beauty in security ceremonies. Philosophy & Technology, 35 (3). p. 72. 72. ISSN 2210-5433 (https://doi.org/10.1007/s13347-022-00552-0)

[thumbnail of Bella-etal-PT-2022-Perceptions-of-beauty-in-security-ceremonies]
Preview
Text. Filename: Bella_etal_PT_2022_Perceptions_of_beauty_in_security_ceremonies.pdf
Final Published Version
License: Creative Commons Attribution 4.0 logo

Download (3MB)| Preview

Abstract

When we use secure computer systems, we engage with carefully orchestrated and ordered interactions called "security ceremonies", all of which exist to assure security. A great deal of attention has been paid to improving the usability of these ceremonies over the last two decades, to make them easier for end-users to engage with. Yet, usability improvements do not seem to have endeared end users to ceremonies. As a consequence, human actors might subvert the ceremony’s processes or avoid engaging with it. Here, we consider whether beautification could be one way of making ceremonies more appealing. To explore beautification in this context, we carried out three studies. Study 1 surveyed 250 participants to derive a wide range of potential dimensions of "beautiful ceremonies". These statements were sorted into dominant themes and converted into statements, which fed into the second study, with 309 respondents, to reveal the dominant dimensions constituting beauty. Study 3 asked 41 participants to carry out a Q-sort, which revealed the ways that people combine the identified dimensions when characterising security ceremonies as "beautiful". These studies have allowed us to pin down the perceived dimensions of beauty in the context of security ceremonies, and also to understand how people combine these dimensions in different ways in judging security ceremonies to be beautiful, confirming the old adage of beauty being "in the eye of the beholder". We conclude by highlighting the constraints imposed by the overarching requirement for security to be maintained in the face of any usability improvements and beautification endeavours.