Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Usable Security in Practice: Collaborative Management of Electronic & Physical Personal Information - Presentation

Usable Security in Practice: Collaborative Management of Electronic & Physical Personal Information - Presentation

Ratings: (0)|Views: 19|Likes:
Published by Laurian Vega
A need exists in HCI to study how issues of trust and privacy can and do affect the ad hoc negotiation of security rules and how they are managed in actual practice. For my dissertation I present data from pilot interviews and observations to examine the physical and electronic security practices of childcares and medical offices. I propose to study the policy breakdowns that affect the security of personal information.
A need exists in HCI to study how issues of trust and privacy can and do affect the ad hoc negotiation of security rules and how they are managed in actual practice. For my dissertation I present data from pilot interviews and observations to examine the physical and electronic security practices of childcares and medical offices. I propose to study the policy breakdowns that affect the security of personal information.

More info:

Published by: Laurian Vega on Oct 17, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/17/2010

pdf

text

original

 
Usable Security in Practice: CollaborativeManagement of Electronic & Physical PersonalInformation
 Laurian C. VegaVirginia Tech
1Sunday, October 17, 2010
 
ComputerScience &Security
2Sunday, October 17, 2010
In the ACM Portal there are 33,619 references with the word “Security” in the title or abstract.While I’m not here to summarize decades of work, I am here to talk about one aspect of security that hasn’t been covered at all until recently. Security literature, when not proposinga deceptive new algorithm, has been known to put forth the position that humans are theweak link in the security chain. Well recent work has pushed back on that notion. That it isn’tthat people aren’t secure, it is that the software that isn’t usable that is the problem. It is anissue that passwords are too complex, and that security systems are not modeled after usermental models.You can read more about this issue in this foundational work, called “Users are not the...My work is an important extension beyond the work of usable security. In my work I look pastsingle individuals looking at computers and instead look at how communities managesecurity and privacy in the work setting.
 
ComputerScience &Security
Adams, A. and M.A.Sasse, Users Are Notthe Enemy, inCommunications of the ACM. 1999. p.40-46.
2Sunday, October 17, 2010
In the ACM Portal there are 33,619 references with the word “Security” in the title or abstract.While I’m not here to summarize decades of work, I am here to talk about one aspect of security that hasn’t been covered at all until recently. Security literature, when not proposinga deceptive new algorithm, has been known to put forth the position that humans are theweak link in the security chain. Well recent work has pushed back on that notion. That it isn’tthat people aren’t secure, it is that the software that isn’t usable that is the problem. It is anissue that passwords are too complex, and that security systems are not modeled after usermental models.You can read more about this issue in this foundational work, called “Users are not the...My work is an important extension beyond the work of usable security. In my work I look pastsingle individuals looking at computers and instead look at how communities managesecurity and privacy in the work setting.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->