Patterns of sharing customizable software
CSCW '90 Proceedings of the 1990 ACM conference on Computer-supported cooperative work
Using social psychology to motivate contributions to online communities
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Social navigation as a model for usable security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Facemail: showing faces of recipients to prevent misdirected email
Proceedings of the 3rd symposium on Usable privacy and security
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Perspectives: improving SSH-style host authentication with multi-path probing
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
Timing is everything?: the effects of timing and placement of online privacy indicators
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
Privacy suites: shared privacy for social networks
Proceedings of the 5th Symposium on Usable Privacy and Security
The compliance budget: managing security behaviour in organisations
Proceedings of the 2008 workshop on New security paradigms
The impact of social navigation on privacy policy configuration
Proceedings of the Sixth Symposium on Usable Privacy and Security
With a little help from my friends: can social navigation inform interpersonal privacy preferences?
Proceedings of the ACM 2011 conference on Computer supported cooperative work
Who says what to whom on twitter
Proceedings of the 20th international conference on World wide web
Why is my internet slow?: making network speeds visible
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Reducing normative conflicts in information security
Proceedings of the 2011 workshop on New security paradigms workshop
Influencing mental models of security: a research agenda
Proceedings of the 2011 workshop on New security paradigms workshop
Proceedings of the Seventh Symposium on Usable Privacy and Security
"I regretted the minute I pressed share": a qualitative study of regrets on Facebook
Proceedings of the Seventh Symposium on Usable Privacy and Security
Community-based web security: complementary roles of the serious and casual contributors
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Friends troubleshooting network: towards privacy-preserving, automatic troubleshooting
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Outage detection via real-time social stream analysis: leveraging the power of online complaints
Proceedings of the 21st international conference companion on World Wide Web
Pools, clubs and security: designing for a party not a person
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
Traditional security mechanisms are part of a larger socio-technical system involving the people and organizations that use them. Yet, those security mechanisms rarely take this social context and social processes into account. In this paper we propose to make security more social, by integrating community oversight into security mechanisms. Like a neighborhood watch, community oversight can provide additional information as more people are able to detect anomalies and problems, as well as foster greater awareness and social norms of security-related behaviors. We describe this new paradigm, several scenarios of use, and the sets of issues involved in implementing this approach.