Fundamentals of computer security technology
Fundamentals of computer security technology
Contextual design: defining customer-centered systems
Contextual design: defining customer-centered systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Communications of the ACM
Trust and risk in Internet commerce
Trust and risk in Internet commerce
Designing trust into online experiences
Communications of the ACM
Users' conceptions of web security: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Writing Secure Code
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Threat Modeling
Official (ISC)2 Guide to the CISSP Exam
Official (ISC)2 Guide to the CISSP Exam
Gathering evidence: use of visual security cues in web browsers
GI '05 Proceedings of Graphics Interface 2005
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
User-Centered Security: Stepping Up to the Grand Challenge
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy and Contextual Integrity: Framework and Applications
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Seeing further: extending visualization as a basis for usable security
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Information ethics, its nature and scope
ACM SIGCAS Computers and Society - Special print issue of ACM SIGCAS Computers and Society: selection of best papers 2004-2006
Trust 2.1: advancing the trust debate
CHI '07 Extended Abstracts on Human Factors in Computing Systems
Security user studies: methodologies and best practices
CHI '07 Extended Abstracts on Human Factors in Computing Systems
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
An Analysis of the Security Patterns Landscape
ICSEW '07 Proceedings of the 29th International Conference on Software Engineering Workshops
Improving security decisions with polymorphic and audited dialogs
Proceedings of the 3rd symposium on Usable privacy and security
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Efficient and Robust TCP Stream Normalization
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Usability of CAPTCHAs or usability issues in CAPTCHA design
Proceedings of the 4th symposium on Usable privacy and security
ON MODELING: An evolving map of design practice and design research
interactions - Designing games: why and how
Proceedings of the 4th annual conference on Information security curriculum development
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
PST '08 Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
PST '08 Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust
SRRS: a recommendation system for security requirements
Proceedings of the 2008 international workshop on Recommendation systems for software engineering
Video steganography for confidential documents: integrity, privacy and version control
Proceedings of the 26th annual ACM international conference on Design of communication
Advances in understanding knowledge work: an experience report
Proceedings of the 26th annual ACM international conference on Design of communication
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
The watcher and the watched: social judgments about privacy in a public place
Human-Computer Interaction
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Timing is everything?: the effects of timing and placement of online privacy indicators
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Social computing privacy concerns: antecedents and effects
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Usable privacy and security in personal health records
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IV
Usable object management approaches for online social networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Trustworthy and inclusive identity management for applications in social media
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
Hi-index | 0.00 |
Researchers in technical communication and information design have important contributions to make to the field of usable privacy and security, also called user-centered security or trust user experience (TUX). I give some background on the usable privacy and security research field and literature, and suggest three example problems that may yield interesting results to SIGDOC researchers.