In the eye of the beholder: a visualization-based approach to information system security

  • Authors:
  • Rogério de Paula;Xianghua Ding;Paul Dourish;Kari Nies;Ben Pillet;David F. Redmiles;Jie Ren;Jennifer A. Rode;Roberto Silva Filho

  • Affiliations:
  • Institute for Software Research, University of California Irvine, Irvine, CA;Institute for Software Research, University of California Irvine, Irvine, CA;Institute for Software Research, University of California Irvine, Irvine, CA;Institute for Software Research, University of California Irvine, Irvine, CA;Institute for Software Research, University of California Irvine, Irvine, CA;Institute for Software Research, University of California Irvine, Irvine, CA;Institute for Software Research, University of California Irvine, Irvine, CA;Institute for Software Research, University of California Irvine, Irvine, CA;Institute for Software Research, University of California Irvine, Irvine, CA

  • Venue:
  • International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Computer system security is traditionally regarded as a primarily technological concern; the fundamental questions to which security researchers address themselves are those of the mathematical guarantees that can be made for the performance of various communication and computational challenges. However, in our research, we focus on a different question. For us, the fundamental security question is one that end-users routinely encounter and resolve for themselves many times a day--the question of whether a system is secure enough for their immediate needs.In this paper, we will describe our explorations of this issue. In particular, we will draw on three major elements of our research to date. The first is empirical investigation into everyday security practices, looking at how people manage security as a practical, day-to-day concern, and exploring the context in which security decisions are made. This empirical work provides a foundation for our reconsideration of the problems of security to a large degree as an interactional problem. The second is our systems approach, based on visualization and event-based architectures. This technical approach provides a broad platform for investigating security and interaction, based on a set of general principles. The third is our initial experiences in a prototype deployment of these mechanisms in an application for peer-to-peer file sharing in face-to-face collaborative settings. We have been using this application as the basis of an initial evaluation of our technology in support of everyday security practices in collaborative workgroups.