Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1143120.1143138acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Seeing further: extending visualization as a basis for usable security

Published: 12 July 2006 Publication History

Abstract

The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of their interactions with a system, as well as, to assess whether or not a system is secure enough for their immediate needs. To this end, we have been exploring two design principles for secure interaction: visualizing system activity and integrating configuration and action. Here we discuss the results of a user study designed as a broad formative examination of the successes and failures of an initial prototype based around these principles. Our response to the results of this study has been twofold. First, we have fixed a number of implementation and usability problems. Second, we have extended our visualizations to incorporate new considerations regarding the temporal and structural organization of interactions.

References

[1]
Jetty Java HTTP Servlet Server, Mort Bay Consulting <http://jetty.mortbay.org/jetty/>.]]
[2]
The Jakarta Slide Projects, <http://jakarta.apache.org/slide/>]]
[3]
Altman, I. (1975). The Environment and Social Behavior. Privacy Personal Space, Territory and Crowding. Monterey, CA. Brooks/Cole Pub. Co., Inc.]]
[4]
Altman, I. (1977). Privacy Regulation: Culturally Universal or Culturally Specific? Journal of Social Issues, 33(3), 66--84.]]
[5]
DePaula, R., X. Ding, et al. (2005). In the Eye of the Beholder: A Visualization-based Approach to Information System Security. International Journal of Human-Computer Studies (IJHCS) Special Issue on HCI Research in Privacy and Security, 63(1--2), 5--24.]]
[6]
DePaula, R., X. Ding, et al. (2005). Two Experiences Designing for Effective Security. In Proceedings of the 2005 Symposium on Usable Privacy and Security (SOUPS 2005), Pittsburgh, PA.]]
[7]
DiGioia, P. and P. Dourish (2005). Social Navigation as a Model for Usable Security. In Proceedinfs of the 2005 Symposium on Usable Privacy and Security (SOUPS 2005), Pittsburgh, PA.]]
[8]
Dourish, P. and Anderson, K. In press. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction.]]
[9]
Goland, Y., E. J. Whitehead, et al. (1999). HTTP Extensions for Distributed Authoring -- WEBDAV, Internet Engineering Task Force: 1--94, RFC 2518.]]
[10]
Hill, W. C., J. D. Hollan, et al. (1992). Read wear and edit wear. In Proceedings of the ACM Conference on Human Factors in Computing Systems. (CHI '92), Monterey, California.]]
[11]
Kowitz, B. and L. Cranor (2005). Peripheral Privacy Notifications for Wireless Networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria, VA.]]
[12]
Plummer, D. C. (1986). Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware, IETF RFC826.]]
[13]
Silva Filho, R. S., D. S. C. R. B., et al. (2003). The Design of a Configurable, Extensible and Dynamic Notification Service. In Proceedings of the Second International Workshop on Distributed Event-Based Systems (DEBS'03), San Diego, CA.]]
[14]
Steinberg, D. and S. Cheshire (2005). Zero Configuration Networking: The Definitive Guide. O'Reilly Media.]]
[15]
Tatar, D., Foster, G., and Bobrow, D. 1991. Designing for Conversation: Lessons from Cognoter. International Journal of Man- Machine Studies, 34(2), 185--209.]]

Cited By

View all
  • (2024)WiP: Enhancing the Comprehension of XACML PoliciesProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657052(41-46)Online publication date: 24-Jun-2024
  • (2023)Six usable privacy heuristicsProceedings of the XXII Brazilian Symposium on Human Factors in Computing Systems10.1145/3638067.3638111(1-11)Online publication date: 16-Oct-2023
  • (2022)Supporting users in data disclosure scenarios in agriculture through transparencyBehaviour & Information Technology10.1080/0144929X.2022.206807041:10(2151-2173)Online publication date: 10-May-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SOUPS '06: Proceedings of the second symposium on Usable privacy and security
July 2006
168 pages
ISBN:1595934480
DOI:10.1145/1143120
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 July 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. configuration in action
  2. dynamic visualizations
  3. effective security
  4. history
  5. peer-to-peer file sharing
  6. theoretical security
  7. usable security
  8. user and media characterization
  9. user study

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 15 of 49 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)2
Reflects downloads up to 17 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)WiP: Enhancing the Comprehension of XACML PoliciesProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657052(41-46)Online publication date: 24-Jun-2024
  • (2023)Six usable privacy heuristicsProceedings of the XXII Brazilian Symposium on Human Factors in Computing Systems10.1145/3638067.3638111(1-11)Online publication date: 16-Oct-2023
  • (2022)Supporting users in data disclosure scenarios in agriculture through transparencyBehaviour & Information Technology10.1080/0144929X.2022.206807041:10(2151-2173)Online publication date: 10-May-2022
  • (2020)Security Visualization Extended Review Issues, Classifications, Validation Methods, Trends, ExtensionsResearch Anthology on Artificial Intelligence Applications in Security10.4018/978-1-7998-7705-9.ch054(1184-1229)Online publication date: 27-Nov-2020
  • (2020)Privacy‐Preserving Data Visualization: Reflections on the State of the Art and Research OpportunitiesComputer Graphics Forum10.1111/cgf.1403239:3(675-692)Online publication date: 18-Jul-2020
  • (2019)On Transparency and Accountability of Smart Assistants in Smart CitiesApplied Sciences10.3390/app92453449:24(5344)Online publication date: 6-Dec-2019
  • (2019)The ubiquitous digital fileJournal of the Association for Information Science and Technology10.1002/asi.2422271:1(E1-E32)Online publication date: 4-Dec-2019
  • (2018)Security Visualization Extended Review Issues, Classifications, Validation Methods, Trends, ExtensionsSecurity and Privacy Management, Techniques, and Protocols10.4018/978-1-5225-5583-4.ch006(152-197)Online publication date: 2018
  • (2018)Survey on Access Control for Community-Centered Collaborative SystemsACM Computing Surveys10.1145/314602551:1(1-38)Online publication date: 4-Jan-2018
  • (2017)User-Friendly Security Patterns for Designing Social Network WebsitesInternational Journal of Technology and Human Interaction10.4018/IJTHI.201701010313:1(39-60)Online publication date: Jan-2017
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media