Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
A cryptographic file system for UNIX
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Communications of the ACM
Security service level agreements: quantifiable security for the enterprise?
Proceedings of the 1999 workshop on New security paradigms
Proceedings of the 2000 workshop on New security paradigms
Security: for ubiquitous computing
Security: for ubiquitous computing
Users' conceptions of web security: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Pretty good persuasion: a first step towards effective password security in the real world
Proceedings of the 2001 workshop on New security paradigms
Challenge: recombinant computing and the speakeasy approach
Proceedings of the 8th annual international conference on Mobile computing and networking
Instant messaging in teen life
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
The Interactive Workspaces Project: Experiences with Ubiquitous Computing Rooms
IEEE Pervasive Computing
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Wan2tlk?: everyday text messaging
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
User Interaction Design for Secure Systems
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Making Passwords Secure and Usable
HCI 97 Proceedings of HCI on People and Computers XII
Calculating costs for quality of security service
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
Incremental assurance for multilevel applications
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
The intellectual challenge of CSCW: the gap between social requirements and technical feasibility
Human-Computer Interaction
Introduction to this special issue on context-aware computing
Human-Computer Interaction
Two experiences designing for effective security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Social navigation as a model for usable security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Redefining computer literacy in the age of ubiquitous computing
Proceedings of the 6th conference on Information technology education
Secrecy, flagging, and paranoia: adoption criteria in encrypted email
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Tensions in designing capture technologies for an evidence-based care community
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Protecting private data in public
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Chatting with teenagers: Considering the place of chat technologies in teen life
ACM Transactions on Computer-Human Interaction (TOCHI)
Looking for trouble: understanding end-user security management
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Password sharing: implications for security design based on social practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Incentive design for home computer security
CHI '07 Extended Abstracts on Human Factors in Computing Systems
Security user studies: methodologies and best practices
CHI '07 Extended Abstracts on Human Factors in Computing Systems
Lessons learned from the deployment of a smartphone-based access-control system
Proceedings of the 3rd symposium on Usable privacy and security
Privacy and the access of information in a smart house environment
Proceedings of the 15th international conference on Multimedia
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
MobiPass: a passport for mobile business
Personal and Ubiquitous Computing
Mind your manners: socially appropriate wireless key establishment for groups
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Where's the beep?: security, privacy, and user misunderstandings of RFID
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Mobile interaction design: Integrating individual and organizational perspectives
Information-Knowledge-Systems Management - Enterprise Mobility: Applications, Technologes and Strategies
Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Exploring a human centered approach to managing visual privacy concerns during collaboration
HCC '08 Proceedings of the 3rd ACM international workshop on Human-centered computing
The watcher and the watched: social judgments about privacy in a public place
Human-Computer Interaction
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Real life challenges in access-control management
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Revealing hidden context: improving mental models of personal firewall users
Proceedings of the 5th Symposium on Usable Privacy and Security
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
Computer-supported access control
ACM Transactions on Computer-Human Interaction (TOCHI)
Security automation considered harmful?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Exploring Employee Perspectives on Information Privacy and Security in the Mobile Environment
Proceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 2009
An information security ontology incorporating human-behavioural implications
Proceedings of the 2nd international conference on Security of information and networks
Digital parenting: designing children's safety
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
Under my pillow: designing security for children's special things
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
Making love in the network closet: the benefits and work of family videochat
Proceedings of the 2010 ACM conference on Computer supported cooperative work
The roles that make the domestic work
Proceedings of the 2010 ACM conference on Computer supported cooperative work
The true cost of unusable password policies: password use in the wild
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Access Control for Home Data Sharing: Attitudes, Needs and Practices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Rethinking RFID: awareness and control for interaction with RFID systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Investigating an appropriate design for personal firewalls
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Creating home network access for the elderly
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
Designing for social interaction with mundane technologies: issues of security and trust
Personal and Ubiquitous Computing
A sense of security in pervasive computing: is the light on when the refrigerator door is closed?
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Proceedings of the 8th international interactive conference on Interactive TV&Video
Two heads are better than one: security and usability of device associations in group scenarios
Proceedings of the Sixth Symposium on Usable Privacy and Security
Folk models of home computer security
Proceedings of the Sixth Symposium on Usable Privacy and Security
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
Integrating user feedback with heuristic security and privacy management systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A diary study of password usage in daily life
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Methodological reflections on a field study of a globally distributed software project
Information and Software Technology
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Tensions in developing a secure collective information practice - the case of agile ridesharing
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Domestic violence and information communication technologies
Interacting with Computers
Influencing mental models of security: a research agenda
Proceedings of the 2011 workshop on New security paradigms workshop
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Journal of Management Information Systems
Practices of information and secrecy in a punk rock subculture
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Security in context: investigating the impact of context on attitudes towards biometric technology
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Moving on from weiser's vision of calm computing: engaging ubicomp experiences
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Security measures in wired and wireless networks
ISIICT'09 Proceedings of the Third international conference on Innovation and Information and Communication Technology
Eighty something: banking for the older old
BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction
Designing textual password systems for children
Proceedings of the 11th International Conference on Interaction Design and Children
Stories as informal lessons about security
Proceedings of the Eighth Symposium on Usable Privacy and Security
Proceedings of the 3rd International Conference on Human Computer Interaction
User Perceptions of Security Technologies
International Journal of Information Security and Privacy
Open sesame: re-envisioning the design of a gesture-based access control system
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Mental models of verifiability in voting
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
"Who decides?": security and privacy in the wild
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
International Journal of Human-Computer Studies
Hi-index | 0.00 |
Ubiquitous and mobile technologies create new challenges for system security. Effective security solutions depend not only on the mathematical and technical properties of those solutions, but also on people’s ability to understand them and use them as part of their work. As a step towards solving this problem, we have been examining how people experience security as a facet of their daily life, and how they routinely answer the question, “is this system secure enough for what I want to do?” We present a number of findings concerning the scope of security, attitudes towards security, and the social and organizational contexts within which security concerns arise, and point towards emerging technical solutions.