Users' conceptions of web security: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Gathering evidence: use of visual security cues in web browsers
GI '05 Proceedings of Graphics Interface 2005
Secrecy, flagging, and paranoia: adoption criteria in encrypted email
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Decision strategies and susceptibility to phishing
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Web wallet: preventing phishing attacks by revealing user intentions
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Power strips, prophylactics, and privacy, oh my!
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Designing user studies for security applications: a case study with wireless network configuration
International Journal of Security and Networks
A methodology for designing information security feedback based on User Interface Patterns
Advances in Engineering Software
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
Proceedings of the Sixth Symposium on Usable Privacy and Security
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings
Proceedings of the Seventh Symposium on Usable Privacy and Security
Indirect content privacy surveys: measuring privacy without asking about it
Proceedings of the Seventh Symposium on Usable Privacy and Security
Pre-Service Teachers' Perceptions of Information Assurance and Cyber Security
International Journal of Information and Communication Technology Education
Hi-index | 0.00 |
Interest in usable security -- the research, development, and study of systems that are both usable and secure -- has been growing both in the CHI and information security communities in the past several years. Despite this interest, however, the process of designing and conducting security-related user studies remains extremely difficult. Users deal with security infrequently and irregularly, and most do not notice or care about security until it is missing or broken. Security is rarely a primary goal or task of users, making many traditional HCI evaluation techniques difficult or even impossible to use. This workshop will bring together researchers and practitioners from the HCI and information security communities to explore methodological challenges and best practices for conducting security-related user studies.