TY - GEN
T1 - Seeing further
T2 - 2nd Symposium on Usable Privacy and Security, SOUPS 2006
AU - Rode, Jennifer
AU - Johansson, Carolina
AU - DiGioia, Paul
AU - Filho, Roberto Silva
AU - Nies, Kari
AU - Nguyen, David H.
AU - Ren, Jie
AU - Dourish, Paul
AU - Redmiles, David
PY - 2006
Y1 - 2006
N2 - The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of their interactions with a system, as well as, to assess whether or not a system is secure enough for their immediate needs. To this end, we have been exploring two design principles for secure interaction: visualizing system activity and integrating configuration and action. Here we discuss the results of a user study designed as a broad formative examination of the successes and failures of an initial prototype based around these principles. Our response to the results of this study has been twofold. First, we have fixed a number of implementation and usability problems. Second, we have extended our visualizations to incorporate new considerations regarding the temporal and structural organization of interactions.
AB - The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of their interactions with a system, as well as, to assess whether or not a system is secure enough for their immediate needs. To this end, we have been exploring two design principles for secure interaction: visualizing system activity and integrating configuration and action. Here we discuss the results of a user study designed as a broad formative examination of the successes and failures of an initial prototype based around these principles. Our response to the results of this study has been twofold. First, we have fixed a number of implementation and usability problems. Second, we have extended our visualizations to incorporate new considerations regarding the temporal and structural organization of interactions.
KW - Configuration in action
KW - Dynamic visualizations
KW - Effective security
KW - History
KW - Peer-to-peer file sharing
KW - Theoretical security
KW - Usable security
KW - User and media characterization
KW - User study
UR - http://www.scopus.com/inward/record.url?scp=34250879822&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=34250879822&partnerID=8YFLogxK
U2 - 10.1145/1143120.1143138
DO - 10.1145/1143120.1143138
M3 - Conference contribution
AN - SCOPUS:34250879822
SN - 1595934480
SN - 9781595934482
T3 - ACM International Conference Proceeding Series
SP - 145
EP - 155
BT - ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
Y2 - 12 July 2006 through 14 July 2006
ER -