What makes Internet users visit cyber stores again? key design factors for customer loyalty
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Contextual Design: Defining Customer-Centered Systems
Contextual Design: Defining Customer-Centered Systems
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Humans in the Loop: Human-Computer Interaction and Security
IEEE Security and Privacy
Aligning Security and Usability
IEEE Security and Privacy
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Who gets to know what when: configuring privacy permissions in an awareness application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A face(book) in the crowd: social Searching vs. social browsing
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Human-Machine Reconfigurations: Plans and Situated Actions
Human-Machine Reconfigurations: Plans and Situated Actions
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
The Emperor's New Security Indicators
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
International Journal of Electronic Commerce
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Modeling Web Site Design Across Cultures: Relationships to Trust, Satisfaction, and E-Loyalty
Journal of Management Information Systems
Beyond the user: use and non-use in HCI
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Do i do what i say?: observed versus stated privacy preferences
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Does domain highlighting help people identify phishing sites?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Improving computer security dialogs
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IV
Shining chrome: using web browser personas to enhance SSL certificate visualization
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IV
Hi-index | 0.00 |
Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.