A penny for your thoughts, a latte for your password
interactions - The art of prototyping
User experiences with sharing and access control
CHI '06 Extended Abstracts on Human Factors in Computing Systems
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Designing Urban Pervasive Systems
Computer
Securing user inputs for the web
Proceedings of the second ACM workshop on Digital identity management
Chatting with teenagers: Considering the place of chat technologies in teen life
ACM Transactions on Computer-Human Interaction (TOCHI)
What is your husband's name?: sociological dimensions of internet banking authentication
OZCHI '06 Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments
User help techniques for usable security
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Improving security decisions with polymorphic and audited dialogs
Proceedings of the 3rd symposium on Usable privacy and security
Understanding web credibility: a synthesis of the research literature
Foundations and Trends in Human-Computer Interaction
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Undercover: authentication usable in front of prying eyes
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Human-in-the-loop: rethinking security in mobile and pervasive systems
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Influencing users towards better passwords: persuasive cued click-points
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1
Computer-supported access control
ACM Transactions on Computer-Human Interaction (TOCHI)
The user is not the enemy: fighting malware by tracking user intentions
Proceedings of the 2008 workshop on New security paradigms
A methodology for designing information security feedback based on User Interface Patterns
Advances in Engineering Software
VideoTicket: detecting identity fraud attempts via audiovisual certificates and signatures
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Multiple password interference in text passwords and click-based graphical passwords
Proceedings of the 16th ACM conference on Computer and communications security
RUP-based process model for security requirements engineering in value-added service development
IWSESS '09 Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
Young Australians' privacy, security and trust in internet banking
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Making policy decisions disappear into the user's workflow
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Usability and strength in click-based graphical passwords
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Teaching Johnny not to fall for phish
ACM Transactions on Internet Technology (TOIT)
Usability of user agents for privacy-preference specification
Proceedings of the 2007 conference on Human interface: Part II
Information security economics - and beyond
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Designing a trade-off between usability and security: a metrics based-model
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
No Code Required: Giving Users Tools to Transform the Web
No Code Required: Giving Users Tools to Transform the Web
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Proceedings of the Sixth Symposium on Usable Privacy and Security
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Targeted risk communication for computer security
Proceedings of the 16th international conference on Intelligent user interfaces
MARASIM: a novel jigsaw based authentication scheme using tagging
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Transactions on Information and System Security (TISSEC)
Human-computer interaction for security research: the case of EU E-banking systems
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IV
Improving usability through password-corrective hashing
SPIRE'06 Proceedings of the 13th international conference on String Processing and Information Retrieval
Development of a privacy addendum for open source licenses: value sensitive design in industry
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Towards usable interfaces for proof based access rights on mobile devices
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Feature: The well-meaning threat
Network Security
Plug-n-trust: practical trusted sensing for mhealth
Proceedings of the 10th international conference on Mobile systems, applications, and services
Risk communication design: video vs. text
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Graphical password authentication using cued click points
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
NAPTune: fine tuning graphical authentication
Proceedings of the 3rd International Conference on Human Computer Interaction
Model-driven privacy and security in multi-modal social media UIs
MSM'11 Proceedings of the 2011 international conference on Modeling and Mining Ubiquitous Social Media
HCSE'12 Proceedings of the 4th international conference on Human-Centered Software Engineering
WYSWYE: shoulder surfing defense for recognition based graphical passwords
Proceedings of the 24th Australian Computer-Human Interaction Conference
Open sesame: re-envisioning the design of a gesture-based access control system
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Trust and privacy in the di.me userware
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
Trustworthy and inclusive identity management for applications in social media
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
Experiences by using AFFINE for building collaborative applications for online communities
OCSC'13 Proceedings of the 5th international conference on Online Communities and Social Computing
Towards visual configuration support for interdependent security goals
OCSC'13 Proceedings of the 5th international conference on Online Communities and Social Computing
Hi-index | 0.00 |
Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security & Usability groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems--how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems--methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g., IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The Classics--groundbreaking papers that sparked the field of security and usability. This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.