The evolution of buildings and implications for the design of ubiquitous domestic environments
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
Wireless infidelity I: war driving
Communications of the ACM - End-user development: tools that empower users to create their own software solutions
Broken expectations in the digital home
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Home networking and HCI: what hath god wrought?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The work to make a home network work
ECSCW'05 Proceedings of the ninth conference on European Conference on Computer Supported Cooperative Work
Network-in-a-box: how to set up a secure wireless network in under a minute
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Sesame: informing user security decisions with system visualization
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
More than meets the eye: transforming the user experience of home network management
Proceedings of the 7th ACM conference on Designing interactive systems
Revealing hidden context: improving mental models of personal firewall users
Proceedings of the 5th Symposium on Usable Privacy and Security
How smart homes learn: the evolution of the networked home and household
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
"Merolyn the phone": a study of Bluetooth naming practices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
ICEbox: toward easy-to-use home networking
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Why is my internet slow?: making network speeds visible
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
MultiNet: reducing interaction overhead in domestic wireless networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Mental models of verifiability in voting
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
Hi-index | 0.01 |
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because of the numerous security threats that can exploit poorly configured and maintained network security. Because there is little empirical data to characterize the usability problems associated with the adoption of wireless network security, we surveyed primary caretakers and users of 20 home networks, examining their perceptions and usage of the security features available to them. We found that users did not understand the difference between access control lists and encryption, and that devices fail to properly notify users of weak security configuration choices. To address these issues, we designed and evaluated a novel wireless router configuration wizard that encouraged strong security choices by improving the network configuration steps. We found that security choices made by users of our wizard resulted in stronger security practices when compared to the wizard from a leading equipment manufacturer.