Role-Based Access Control Models
Computer
An hour in the life: towards requirements for modelling multiple task work
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Enemy at the gate: threats to information security
Communications of the ACM - Program compaction
"Constant, constant, multi-tasking craziness": managing multiple working spheres
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A diary study of task switching and interruptions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
If not now, when?: the effects of interruption at different moments within task execution
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
No task left behind?: examining the nature of fragmented work
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Intentional access management: making access control usable for end-users
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Disruption and recovery of computing tasks: field study, analysis, and directions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Transactions on Computer-Human Interaction (TOCHI)
The cost of interrupted work: more speed and stress
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Information Foraging Theory: Adaptive Interaction with Information
Information Foraging Theory: Adaptive Interaction with Information
The scope and importance of human interruption in human-computer interaction design
Human-Computer Interaction
Allocating time across multiple texts: sampling and satisficing
Human-Computer Interaction
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Self-interruption on the computer: a typology of discretionary task interleaving
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 5th Symposium on Usable Privacy and Security
Enforcing access control in Web-based social networks
ACM Transactions on Information and System Security (TISSEC)
So long, and no thanks for the externalities: the rational rejection of security advice by users
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Multitasking and monotasking: the effects of mental workload on deferred task interruptions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Transactions on Computer-Human Interaction (TOCHI)
Measuring multitasking behavior with activity-based metrics
ACM Transactions on Computer-Human Interaction (TOCHI)
Skim reading by satisficing: evidence from eye tracking
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The effects of time constraints on user behavior for deferrable interruptions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Rational security: Modelling everyday password use
International Journal of Human-Computer Studies
"A pace not dictated by electrons": an empirical study of work without email
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Hi-index | 0.00 |
Technological developments have increased the opportunity for interleaving between tasks, leading to more interruptions and more choices for users. Three experiments tested the interleaving strategies of users completing simple office-based tasks while adjusting access control privileges to documents. Previous work predicted users would switch tasks to enable them to work on the task that produced the greatest current benefit-they would maximise the marginal rate of return. Results found that by interleaving between tasks users were able to focus on shorter tasks and that the interleaving decisions were consistent with a strategy of maximising the marginal rate of return. However, interruptions from access control tasks disrupted the processing involved in this task management and led to errors in task selection (Experiment 2) and task performance (Experiment 3). Task interleaving can therefore have costs in security contexts where errors can be catastrophic. Understanding which strategies maximise the marginal rate of return could predict users' task management behaviour.