From system descriptions to scripts for action
Design at work
Getting around the task-artifact cycle: how to make claims and design by scenario
ACM Transactions on Information Systems (TOIS)
Groupware and social dynamics: eight challenges for developers
Communications of the ACM
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
The integration of computing and routine work
ACM Transactions on Information Systems (TOIS) - Special issue: selected papers from the conference on office information systems
Through the Interface: A Human Activity Approach to User Interface Design
Through the Interface: A Human Activity Approach to User Interface Design
Group dynamics and ubiquitous computing
Communications of the ACM
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Cultural probes and the value of uncertainty
interactions - Funology
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Technology as Experience
The mechanics of trust: a framework for research and design
International Journal of Human-Computer Studies
Social navigation as a model for usable security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
When second wave HCI meets third wave challenges
Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles
Privacy and security: A multidimensional problem
Communications of the ACM - Remembering Jim Gray
Affect and Emotion in Human-Computer Interaction
Threats or threads: from usable security to secure experience?
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
A card-sorting probe of e-banking trust perceptions
BCS-HCI '07 Proceedings of the 21st British HCI Group Annual Conference on People and Computers: HCI...but not as we know it - Volume 1
Proceedings of the ACM 2009 international conference on Supporting group work
The ins and outs of home networking: The case for useful and usable domestic networking
ACM Transactions on Computer-Human Interaction (TOCHI)
Privacy and security: Usable security: how to get it
Communications of the ACM - Scratch Programming for All
THE WAY I SEE IT: When security gets in the way
interactions - Catalyzing a Perfect Storm
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A sense of security in pervasive computing: is the light on when the refrigerator door is closed?
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
interactions
Negotiating privacy boundaries in social applications for accessibility mapping
Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries
Experiencing security in interaction design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Hi-index | 0.00 |
The title of this paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable IT security is established in the literature. Recent literature has called for better conceptual models as starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them understand better the work that goes into everyday security. The result is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects.