Enhancing Research into Usable Privacy and Security

被引:0
|
作者
Birge, Colin [1 ]
机构
[1] Univ Washington, Dept Human Centered Design & Engn, Seattle, WA 98195 USA
关键词
Privacy; privacy policies; usable privacy and security; trust user experience; user-centered security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers in technical communication and information design have important contributions to make to the field of usable privacy and security, also called user-centered security or trust user experience (TUX) I give some background on the usable privacy and security research field and literature, and suggest three example problems that may yield interesting results to SIGDOC researchers
引用
收藏
页码:221 / 225
页数:5
相关论文
共 50 条
  • [1] How WEIRD is Usable Privacy and Security Research?
    Hasegawa, Ayako A.
    Inoue, Daisuke
    Akiyama, Mitsuaki
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3241 - 3258
  • [2] Usable Security and Privacy for Security and Privacy Workers
    Zurko, Mary Ellen
    Haney, Julie
    IEEE SECURITY & PRIVACY, 2023, 21 (01) : 8 - 10
  • [3] Usable privacy and security
    De Luca, Alexander
    von Zezschwitz, Emanuel
    IT-INFORMATION TECHNOLOGY, 2016, 58 (05): : 215 - 216
  • [4] A Survey of User Experience in Usable Security and Privacy Research
    Jacobs, Danielle
    McDaniel, Troy
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST, HCI-CPT 2022, 2022, 13333 : 154 - 172
  • [5] Usable Security und Privacy
    Simone Fischer-Hübner
    Luigi Lo Iacono
    Sebastian Möller
    Datenschutz und Datensicherheit - DuD, 2010, 34 (11) : 773 - 782
  • [6] Privacy and Security Usable Security: How to Get It
    Lampson, Butler
    COMMUNICATIONS OF THE ACM, 2009, 52 (11) : 25 - 27
  • [7] A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard
    Ling, Zhen
    Borgeest, Melanie
    Sano, Chuta
    Lin, Sirong
    Fadl, Mogahid
    Yu, Wei
    Fu, Xinwen
    Zhao, Wei
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 716 - 728
  • [8] A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead
    Reuter, Christian
    Iacono, Luigi Lo
    Benlian, Alexander
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2022, 41 (10) : 2035 - 2048
  • [9] Usable privacy and security for personal information management
    Karat, CM
    Brodie, C
    Karat, J
    COMMUNICATIONS OF THE ACM, 2006, 49 (01) : 56 - 57
  • [10] Game theoretical analysis of usable security and privacy
    Justine, Cynara
    Prasad, Rendhir R.
    Thomas, Ciza
    SECURITY AND PRIVACY, 2021, 4 (05):