Balancing Usability and Protection in AI and Data Security: A Human-Centric Approach

Al-Ansari, Mohammed Jassim, Al Ahmed, Yazan and El Bahnaswi, Hadeel Hesham (2025) Balancing Usability and Protection in AI and Data Security: A Human-Centric Approach. In: 2024 11th International Conference on Software Defined Systems (SDS). Institute of Electrical and Electronics Engineers (IEEE), pp. 80-88. ISBN 979-8-3315-1833-2

[thumbnail of AAM]
Preview
PDF (AAM) - Accepted Version
562kB

Official URL: https://doi.org/10.1109/SDS64317.2024.10883898

Abstract

As artificial intelligence (AI) systems become integral to our daily lives, the challenge lies in striking the delicate balance between usability and protection. This paper advocates for a human-centric approach—one that considers not only technical safeguards but also user experience. We explore behavioral insights, transparent communication, and collaborative efforts to enhance security while ensuring seamless interactions. By prioritizing both usability and protection, we pave the way for a secure and user-friendly AI landscape The increasing interplay between protection and usability results from the incorporation of artificial intelligence (AI) systems into our digital lifestyles. This research, which focuses on the Usability-Privacy Nexus, promotes a human-centric approach that goes beyond conventional security paradigms. We can design security procedures to fit users' mental models and decision-making processes by studying human behavior. Users must have open lines of communication and be trusted to understand the consequences of their actions. There are some methods for informing consumers about security measures without becoming too intrusive. Organizational culture, training initiatives, and user education are crucial factors that go beyond technical solutions. Awareness programs, nudges, and gamification can improve security literacy. Collaboration and user-centered design are also vital, incorporating people early in the process. Through the integration of behavioral information, entities can customize security protocols.


Repository Staff Only: item control page