chi07 - CHI 2007 CHI 2006 Workshop April 28-May 3, 2007 San...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Security User Studies: Methodologies and Best Practices Abstract Interest in usable security -- the research, development, and study of systems that are both usable and secure -- has been growing both in the CHI and information security communities in the past several years. Despite this interest, however, the process of designing and conducting security-related user studies remains extremely difficult. Users deal with security infrequently and irregularly, and most do not notice or care about security until it is missing or broken. Security is rarely a primary goal or task of users, making many traditional HCI evaluation techniques difficult or even impossible to use. This workshop will bring together researchers and practitioners from the HCI and information security communities to explore methodological challenges and best practices for conducting security-related user studies. Keywords Information security, usable security, user studies ACM Classification Keywords H5.m. Information interfaces and presentation (e.g., HCI): Miscellaneous.; H.5.2 User Interfaces: Evaluation/methodology Copyright is held by the author/owner(s). CHI 2007, April 28–May 3, 2007, San Jose, California, USA. ACM 978-1-59593-642-4/07/0004. Serge Egelman Carnegie Mellon University [email protected] Jen King Yahoo!, Inc [email protected] sims.berkeley.edu Robert C. Miller MIT CS & AI Laboratory [email protected] Nick Ragouzis Enosis Group LLC [email protected] Erika Shehan Georgia Institute of Technology [email protected] CHI 2006 • Workshop April 28-May 3, 2007 • San Jose, CA, USA 2833 CHI 2007 • Workshop
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Introduction As networked computing weaves itself into many aspects of daily life, ensuring the security of networked systems is becoming vitally important. Much of the existing body of information security research focuses on making cryptographic algorithms that are harder to break, protocols that are more robust, and computer systems that are resistant to attack. Although this work provides a foundation necessary for creating secure environments, lack of attention to usability in security has resulted in a world where security-related functionality is often complex and counterintuitive. Interest in usable security -- the research, development, and study of systems that are both usable and secure -- has been growing both in the CHI and information security communities in the past several years, as indicated by a number of research articles on usable security, a CHI workshop focused on HCI and security systems [9], and the establishment of a conference on exclusively focused on usable security and privacy [1]. Despite this increased interest in usable security, the process of conducting effective, ethical security-related user studies remains daunting, even to experienced HCI practitioners and researchers. Challenges of Security-Related User Studies
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/05/2009 for the course IT IS taught by Professor Arther during the Three '09 term at Queensland Tech.

Page1 / 4

chi07 - CHI 2007 CHI 2006 Workshop April 28-May 3, 2007 San...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online