Sciweavers

BCSHCI
2008
15 years 5 months ago
Influencing users towards better passwords: persuasive cued click-points
Usable security has unique usability challenges because the need for security often means that standard humancomputer-interaction approaches cannot be directly applied. An importa...
Sonia Chiasson, Alain Forget, Robert Biddle, Paul ...
SOUPS
2005
ACM
15 years 9 months ago
Social navigation as a model for usable security
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a...
Paul DiGioia, Paul Dourish
FC
2007
Springer
104views Cryptology» more  FC 2007»
15 years 10 months ago
A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?
In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this the...
Jakob Illeborg Pagter, Marianne Graves Petersen
119
Voted
CHI
2008
ACM
16 years 4 months ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...