Communications of the ACM
Designing for ephemerality and prototypicality
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Technology as Experience
When second wave HCI meets third wave challenges
Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles
Privacy and security: A multidimensional problem
Communications of the ACM - Remembering Jim Gray
Threats or threads: from usable security to secure experience?
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
Privacy and security: Usable security: how to get it
Communications of the ACM - Scratch Programming for All
THE WAY I SEE IT: When security gets in the way
interactions - Catalyzing a Perfect Storm
Designing a trade-off between usability and security: a metrics based-model
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Experience-Centered Design: Designers, Users, and Communities in Dialogue
Experience-Centered Design: Designers, Users, and Communities in Dialogue
Proceedings of the 3rd International Conference on Human Computer Interaction
Hi-index | 0.01 |
Security is experienced differently in different contexts. This paper argues that in everyday situations, users base their security decisions on a mix of prior experiences. When approaching security and interaction design from an experience approach, tools that help bring out such relevant experiences for design are needed. This paper reports on how Prompted exploration workshops and Acting out security were developed to target such experiences when iteratively designing a mobile digital signature solution in a participatory design process. We discuss how these tools helped the design process and illustrate how the tangibility of such tools matters. We further demonstrate how the approach grants access to non-trivial insights into people's security experience. We point out how the specific context is essential for exploring the space between experience and expectations, and we illustrate how people activate their collections of security experiences rather than deploying one security strategy in all situations.