CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A “pile” metaphor for supporting casual organization of information
CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
COCS '93 Proceedings of the conference on Organizational computing systems
Artificial Intelligence - Special volume on computational research on interaction and agency, part 2
How do people organize their desks?: Implications for the design of office information systems
ACM Transactions on Information Systems (TOIS)
Pretty good persuasion: a first step towards effective password security in the real world
Proceedings of the 2001 workshop on New security paradigms
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Usability and privacy: a study of Kazaa P2P file-sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Keepin' it real: pushing the desktop metaphor with physics, piles and the pen
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Seeing further: extending visualization as a basis for usable security
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
User help techniques for usable security
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Understanding web credibility: a synthesis of the research literature
Foundations and Trends in Human-Computer Interaction
Sesame: informing user security decisions with system visualization
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The social web: global village or private cliques?
Proceedings of the 2007 conference on Designing for User eXperiences
Threats or threads: from usable security to secure experience?
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
Information displays for managing shared files
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Guidelines for designing IT security management tools
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
SCAN tools for collaborative learning
CSCL'09 Proceedings of the 9th international conference on Computer supported collaborative learning - Volume 1
Security automation considered harmful?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Two heads are better than one: security and usability of device associations in group scenarios
Proceedings of the Sixth Symposium on Usable Privacy and Security
The impact of social navigation on privacy policy configuration
Proceedings of the Sixth Symposium on Usable Privacy and Security
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
Principles for applying social navigation to collaborative systems
Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology
Browse and discover: social file sharing in the enterprise
Proceedings of the ACM 2011 conference on Computer supported cooperative work
With a little help from my friends: can social navigation inform interpersonal privacy preferences?
Proceedings of the ACM 2011 conference on Computer supported cooperative work
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings
Proceedings of the Seventh Symposium on Usable Privacy and Security
Bringing the user back into control: a new paradigm for usability in highly dynamic systems
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Proceedings of the 3rd International Conference on Human Computer Interaction
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a number of researchers have examined. In this paper, we discuss the use of the social navigation paradigm as a way of organizing visual displays of system action. Drawing on a previous study of security in the Kazaa peer to peer system, we present some examples of the ways in which social navigation can be incorporated in support of usable security.