Seeing further: Extending visualization as a basis for usable security

Jennifer Rode, Carolina Johansson, Paul DiGioia, Roberto Silva Filho, Kari Nies, David H. Nguyen, Jie Ren, Paul Dourish, David Redmiles

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Scopus citations

Abstract

The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of their interactions with a system, as well as, to assess whether or not a system is secure enough for their immediate needs. To this end, we have been exploring two design principles for secure interaction: visualizing system activity and integrating configuration and action. Here we discuss the results of a user study designed as a broad formative examination of the successes and failures of an initial prototype based around these principles. Our response to the results of this study has been twofold. First, we have fixed a number of implementation and usability problems. Second, we have extended our visualizations to incorporate new considerations regarding the temporal and structural organization of interactions.

Original languageEnglish (US)
Title of host publicationACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
Pages145-155
Number of pages11
DOIs
StatePublished - 2006
Externally publishedYes
Event2nd Symposium on Usable Privacy and Security, SOUPS 2006 - Pittsburgh, PA, United States
Duration: Jul 12 2006Jul 14 2006

Publication series

NameACM International Conference Proceeding Series
Volume149

Conference

Conference2nd Symposium on Usable Privacy and Security, SOUPS 2006
Country/TerritoryUnited States
CityPittsburgh, PA
Period7/12/067/14/06

Keywords

  • Configuration in action
  • Dynamic visualizations
  • Effective security
  • History
  • Peer-to-peer file sharing
  • Theoretical security
  • Usable security
  • User and media characterization
  • User study

Fingerprint

Dive into the research topics of 'Seeing further: Extending visualization as a basis for usable security'. Together they form a unique fingerprint.

Cite this