Sciweavers

SOUPS
2005
ACM
14 years 5 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
SOUPS
2005
ACM
14 years 5 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...
SOUPS
2005
ACM
14 years 5 months ago
Authentication using graphical passwords: effects of tolerance and image choice
Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed...
Susan Wiedenbeck, Jim Waters, Jean-Camille Birget,...
SOUPS
2005
ACM
14 years 5 months ago
Making PRIME usable
Privacy-enhanced Identity Management can enable users to retain and maintain informational self-determination in our networked society. This paper describes the usability research...
John Sören Pettersson, Simone Fischer-Hü...
SOUPS
2005
ACM
14 years 5 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
SOUPS
2005
ACM
14 years 5 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
SOUPS
2005
ACM
14 years 5 months ago
Stopping spyware at the gate: a user study of privacy, notice and spyware
Spyware is a significant problem for most computer users. The term “spyware” loosely describes a new class of computer software. This type of software may track user activitie...
Nathaniel Good, Rachna Dhamija, Jens Grossklags, D...
SOUPS
2005
ACM
14 years 5 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
SOUPS
2005
ACM
14 years 5 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
SOUPS
2005
ACM
14 years 5 months ago
Social navigation as a model for usable security
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a...
Paul DiGioia, Paul Dourish