IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Design for conversation: lessons from Cognoter
International Journal of Man-Machine Studies - Computer-supported cooperative work and groupware. Part 1
Technological frames: making sense of information technology in organizations
ACM Transactions on Information Systems (TOIS) - Special issue on social science perspectives on IS
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Security service level agreements: quantifiable security for the enterprise?
Proceedings of the 1999 workshop on New security paradigms
Proceedings of the 2000 workshop on New security paradigms
Design and evaluation of a wide-area event notification service
ACM Transactions on Computer Systems (TOCS)
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Usability and privacy: a study of Kazaa P2P file-sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Toward a Taxonomy and Costing Method for Security Services
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Calculating costs for quality of security service
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Incremental assurance for multilevel applications
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
The design of a configurable, extensible and dynamic notification service
Proceedings of the 2nd international workshop on Distributed event-based systems
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
The construction of usefulness: how users and context create meaning with a social networking system
The construction of usefulness: how users and context create meaning with a social networking system
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Striving for versatility in publish/subscribe infrastructures
SEM '05 Proceedings of the 5th international workshop on Software engineering and middleware
Aligning usability and security: a usability study of Polaris
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Seeing further: extending visualization as a basis for usable security
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
PrivateBits: managing visual privacy in web browsers
GI '07 Proceedings of Graphics Interface 2007
Analyzing websites for user-visible security design flaws
Proceedings of the 4th symposium on Usable privacy and security
ACC'08 Proceedings of the WSEAS International Conference on Applied Computing Conference
Towards improving mental models of personal firewall users
CHI '09 Extended Abstracts on Human Factors in Computing Systems
Secure asynchronous communication for mobile devices
Proceedings of the Warm Up Workshop for ACM/IEEE ICSE 2010
Revealing hidden context: improving mental models of personal firewall users
Proceedings of the 5th Symposium on Usable Privacy and Security
A sense of security in pervasive computing: is the light on when the refrigerator door is closed?
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
User Perceptions of Security Technologies
International Journal of Information Security and Privacy
Hi-index | 0.00 |
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decisions regarding potential privacy and security problems, as well as regarding potential implications of their actions. To this end, we have designed technical infrastructures that make visible the configurations, activities, and implications of available security mechanisms. This thus allows users to make informed choices and take coordinated and appropriate actions when necessary. This work differs from the more traditional security usability work in that our focus is not only on the usability of security mechanism (e.g., the ease-of-use of an access control interface), but how security can manifest itself as part of people's interactions with and through information systems (i.e., how people experience and interpret privacy and security situations, and are enabled or constrained by existing technological mechanisms to act appropriately). In this paper, we report our experiences designing, developing, and testing two technical infrastructures for supporting this approach for usable security.