3,302 Hits in 10.2 sec

Designing and Evaluating Usable Technology in Industrial Research: Three Case Studies

Clare-Marie Karat, John Karat
2010 Synthesis Lectures on Human-Centered Informatics  
John and Clare-Marie Karat have conducted HCI research to create innovative usable technology for users across a variety of domains.  ...  Then case study examples of HCI approaches to the design and evaluation of usable solutions for people are presented and discussed in three domain areas: • Conversational speech technologies, • Personalization  ...  Acknowledgments We wish to express our appreciation for the HCI book series editor, Jack Carroll, and the Morgan and Claypool editor Diane Cerra for their contributions to the completion of this book.  ... 
doi:10.2200/s00228ed1v01y200911hcr007 fatcat:mccjcurbtzdipc3kfk6vbdktdy

How acceptable is this? How user experience factors can broaden our understanding of the acceptance of privacy trade-offs

Verena Distler, Carine Lallemand, Vincent Koenig
2019 Computers in Human Behavior  
If you choose to participate, you will be allowing your doctor's office to upload your health records to the website and the doctor promises it is a secure site."  ...  If you choose to participate, you will be creating a profile using your real name and sharing a photo of yourself.  ...  While this calls for further research, it also points out that pragmatic aspects alone are insufficient for explaining privacy trade-offs; a prominent example is that of "control" or "autonomy" suggesting  ... 
doi:10.1016/j.chb.2019.106227 fatcat:3miym4dtrnf25budq2oddsh3ya

An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects [chapter]

Martina de Gramatica, Fabio Massacci, Olga Gadyatskaya
2014 Communications in Computer and Information Science  
This paper presents only the authors' point of view, and does not reflect the opinion of the EC.  ...  The work leading to this report was supported by the EU under the FP7 ICT EFFECTS+ and SECCORD projects.  ...  I am working for a company, not a research institute, and we are mostly interested in having results concretely usable».  ... 
doi:10.1007/978-3-319-12574-9_14 fatcat:wbh33s23cna7rnozpcqsbgp5ym

Ubiquitous systems and the family

Linda Little, Elizabeth Sillence, Pam Briggs
2009 Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS '09  
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives.  ...  We present a Pre-Concept Evaluation Tool (PRECET) for use in design and implementation of ubicomp systems.  ...  just trusting this, you are not actually sitting down doing your sums at the end of each month, you know it is essentially dis-empowering you.'  ... 
doi:10.1145/1572532.1572540 dblp:conf/soups/LittleSB09 fatcat:7u63wzakt5geveym6wufttelpi

Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science

Ivan Flechais, M. Angela Sasse
2009 International Journal of Human-Computer Studies  
Secondly, this paper examines the steps that projects can undertake to ensure that security requirements are correctly identified, and security measures are usable by the intended research community.  ...  This raises two issues: ensuring that (1) the security mechanisms put in place are usable by the different users of the system, and (2) the security of the overall system satisfies the security needs of  ...  The needs of users, data providers, administrators, and developers are also important for security.  ... 
doi:10.1016/j.ijhcs.2007.10.002 fatcat:wmjvlgwwzjhqpo2bpdzxtiiwc4

While working around security

Niels Raabjerg Mathiasen, Marianne Graves Pedersen, Susanne Bødker
2011 Proceedings of the 3rd International Conference on Human Computer Interaction - IndiaHCI '11  
The result is a methodological toolbox that helps address and design for usable and useful IT security.  ...  First of all the paper discusses how users of IT deal with issues of IT security in their everyday life.  ...  Overall, our quest echoes the warnings to designers of Grudin [21] and Churchill [9] : The user is not you, and you are not the user!  ... 
doi:10.1145/2407796.2407798 fatcat:7ybns4np4jfbrjfw35rvzlua7e

Generative usability

Luke Church, Alma Whitten
2009 Proceedings of the 2009 workshop on New security paradigms workshop - NSPW '09  
We show how security concerns and the processes of user centered design tend to encourage a migration towards the appliance end of the spectrum and then describe problems that arise from this.  ...  We then suggest an alternative route towards allowing users more direct control over their information via end user programming, discuss some of the challenges in doing so and how they might be overcome  ...  We are working on projects doing exactly this, which we suggest may form the beginnings of a new paradigm for security usability.  ... 
doi:10.1145/1719030.1719038 dblp:conf/nspw/ChurchW09 fatcat:7d4qbr3wavag7aeiwx2cppl4q4

A Collaborative Tool for Communities of Practice to Share Best Practices [chapter]

Justus N. Nyagwencha, Sheryl Seals, Tony Cook
2011 Communications in Computer and Information Science  
The proposed research will be designed, developed and deployed as a secure collaborative tool or system that addresses issues related to usability, adaptation, and managing community of practice groups  ...  The model provides a user friendly and efficient method for moderating a high number of users within groups by automating group formation.  ...  This study listed a variety of tools we considered as collaboration tools, but were not selected either because of usability or a security issue.  ... 
doi:10.1007/978-3-642-22095-1_105 fatcat:4isydz7aibbs5ankex3sk7pjzm

The Myth of the Average User

Serge Egelman, Eyal Peer
2015 Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW '15  
CCS Concepts •Security and privacyUsability in security and privacy; •Human-centered computing → Human computer interaction (HCI);  ...  Based on this result, we introduce the new paradigm of psychographic targeting of privacy and security mitigations: we believe that the next frontier in privacy and security research will be to tailor  ...  We believe that these findings form the basis for a research agenda into improving privacy and security outcomes by tailoring mitigations around individual differences.  ... 
doi:10.1145/2841113.2841115 dblp:conf/nspw/EgelmanP15 fatcat:yql7xprle5fx7hzdjqbw665pae

White Noise from the White Goods? Conceptual and Empirical Perspectives on Ambient Domestic Computing [article]

Lachlan Urquhart
2018 arXiv   pre-print
The novelty of our contribution stems from a turn to practice through a set of empirical perspectives.  ...  We also look to the emerging regulatory solution of privacy by design, unpacking practical challenges it faces.  ...  privacy and security, for example, the goal is to create technical responses to regulatory challenges that are comprehensible and usable for end users.  ... 
arXiv:1801.07185v1 fatcat:2y6ahntairdtfjzvhlba6gf2e4

Any Thing for Anyone? A New Digital Divide in Internet-of-Things Skills

Alexander J. A. M. van Deursen, Karen Mossberger
2018 Policy & Internet  
Finally, we bring together the issues of the digital divide and IoT skills, and set an agenda for future IoT public policy and research.  ...  We discuss evolving digital technologies and related skills, and explain from a systems perspective how the IoT differs from prior technologies, with a premium placed on user knowledge and strategic skills  ...  We propose an agenda for further research on IoT, skills and implications for public policy. We discuss the development of the Internet into the IoT, and provide a working definition.  ... 
doi:10.1002/poi3.171 fatcat:utrymofi4jbnrafhojve5k63l4

Information Privacy: Management, Marketplace, and Legal Challenges

Yolande E. Chan, Mary J. Culnan, Kathleen Greenaway, Gary Laden, Toby Levin, H. Jeff Smith
2005 Communications of the Association for Information Systems  
The panelists examined privacy disasters as a way of exposing these management challenges, discussed government and self-regulatory approaches to information privacy, and raised opportunities for research  ...  In addition, a list of research questions is offered. The panelists provided key privacy information sources. A privacy bibliography is included.  ...  Kathleen Greenaway was not on the panel but assisted with planning, preparing the manuscript and identifying additional resource materials.  ... 
doi:10.17705/1cais.01612 fatcat:tvumfkowrnbwdedkvqapbiymgy

Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice

Douglas Maughan, David Balenson, Ulf Lindqvist, Zachary Tudor
2013 IEEE Security and Privacy  
It does not matter how visionary a technology is unless it meets the needs and requirements of customers/users and it is available as a product via channels that are acceptable to the customers/users.  ...  New and innovative technologies will only make a difference if they are deployed and used.  ...  ACKNOWLEDGMENTS The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or  ... 
doi:10.1109/msp.2013.31 fatcat:4f4sajge4zeuvfr2zkz4iq75am

An online experiment of privacy authorization dialogues for social applications

Na Wang, Jens Grossklags, Heng Xu
2013 Proceedings of the 2013 conference on Computer supported cooperative work - CSCW '13  
Researchers have criticized the interfaces to "configure" privacy preferences as opaque, uninformative, and ineffective.  ...  Several studies have documented the constantly evolving privacy practices of social networking sites and users' misunderstandings about them.  ...  Any opinions, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/2441776.2441807 dblp:conf/cscw/WangGX13 fatcat:2tk7hshghbaolph74oz5e4mncu

Mobile Security: Threats and Best Practices

Paweł Weichbroth, Łukasz Łysik, Quanzhong Li
2020 Mobile Information Systems  
Therefore, future work will cover identifying and modeling users' perceptions of the security and usability of mobile applications.  ...  Afterwards, this outcome was put forward for consideration by mobile application users (n = 167) via a survey instrument.  ...  user attitudes toward security and privacy.  ... 
doi:10.1155/2020/8828078 fatcat:7m7tjbg7j5a3pn2hjwloyjnphi
« Previous Showing results 1 — 15 out of 3,302 results