Risks of the passport single signon protocol
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Making Use: Scenario-Based Design of Human-Computer Interactions
Making Use: Scenario-Based Design of Human-Computer Interactions
Designing social presence of social actors in human computer interaction
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Why Information Security is Hard-An Economic Perspective
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Towards Secure Design Choices for Implementing Graphical Passwords
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Improving user-interface dependability through mitigation of human error
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Security and usability engineering with particular attention to electronic mail
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Privacy in information technology: designing to enable privacy policy management in organizations
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Privacy practices of Internet users: self-reports versus observed behavior
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Secrets and Lies
End user concern about security and privacy threats
Proceedings of the 3rd symposium on Usable privacy and security
A framework for reasoning about the human in the loop
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
Security and usability research using a microworld environment
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
Teaching privacy with ubicomp scenarios in HCI classes
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Proceedings of the 8th international interactive conference on Interactive TV&Video
Folk models of home computer security
Proceedings of the Sixth Symposium on Usable Privacy and Security
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
Principles for applying social navigation to collaborative systems
Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology
Integrating user feedback with heuristic security and privacy management systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Influencing mental models of security: a research agenda
Proceedings of the 2011 workshop on New security paradigms workshop
Stories as informal lessons about security
Proceedings of the Eighth Symposium on Usable Privacy and Security
User Perceptions of Security Technologies
International Journal of Information Security and Privacy
UAHCI'13 Proceedings of the 7th international conference on Universal Access in Human-Computer Interaction: design methods, tools, and interaction techniques for eInclusion - Volume Part I
Hi-index | 0.00 |
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This paper challenges this view as derogatory and unconstructive, arguing that users, as agents of organizations, often have sophisticated strategies regarding sensitive data, and are quite cautious. Existing work on user security practice has failed to consider how users view security; this paper provides content on and analysis of end user perspectives on security management. We suggest that properly designed systems would bridge the knowledge gap (where necessary) and mask levels of detail (where possible), allowing users to manage their security needs in synchrony with the needs of the organization. The evidence for our arguments comes from a set of in-depth interviews with users with no special training on, knowledge of, or interest in computer security. We conclude with guidelines for security and privacy tools that better leverage existing users knowledge.