Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a...
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...