ABSTRACT
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a number of researchers have examined. In this paper, we discuss the use of the social navigation paradigm as a way of organizing visual displays of system action. Drawing on a previous study of security in the Kazaa peer to peer system, we present some examples of the ways in which social navigation can be incorporated in support of usable security.
- Brostoff, S. and Sasse, A. 2000. Are Passfaces More Usable than Passwords? A Field Trial Investigation. Proc. HCI'2000.Google Scholar
- DePaula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D., Ren, J., Rode, J. and Silva Filho, R. 2005. In the Eye of the Beholder: A Visualization-based Approach to Information System Security. To appear in International Journal of Human-Computer Studies. Google ScholarDigital Library
- Dhamija, R. and Perrig, A. 2000. Déjà vu: A user study using images for authentication. In Proc. 9th USENIX Security Symposium (Denver, CO, USA, Aug. 2000). Google ScholarDigital Library
- Dourish, P. 2000. Towards an Infrastructure for Pervasive Recommendations. Position paper for the CHI 2000 Workshop on Social Navigation: A Design Approach.Google Scholar
- Dourish, P. and Chalmers, M. 1994. Running Out of Space: Models of Information Navigation. Short paper presented at HCI'94 (Glasgow, UK).Google Scholar
- Dourish, P. and Redmiles, D. 2002. An Approach to Usable Security Based on Event Monitoring and Visualization. Proceedings of the New Security Paradigms Workshop 2002 (Virginia Beach, VA). Google ScholarDigital Library
- Dourish, P., Grinter, R., Delgado de la Flor, J., and Joseph, M. 2004. Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitous Computing, 8(6), 391--401. Google ScholarCross Ref
- Good, N. and Krekelberg, A. 2003. Usability and Privacy: A Study of Kazaa File Sharing. Proceedings of the ACM Conference on Human Factors in Computing Systems CHI 2003 (Fort Lauderdale, FL), 137--145. New York: ACM. Google ScholarDigital Library
- Hill, W., Hollan, J., Wroblewski, D., and McCandless, J. 1992. Edit Wear and Read Wear. Proc. ACM Conf. Human Factors in Computing Systems CHI'92 (Monterey, CA), 3--9. New York: ACM. Google ScholarDigital Library
- Höök, K., Benyon, D., and Munro, A. 2003. Designing Information Systems: The Social Navigation Approach. Springer.Google Scholar
- Kirsh, D. 1995. The Intelligent use of Space. Artificial Intelligence, 73(1--2), 31--68. Google ScholarDigital Library
- Malone, T. 1983. How Do People Organize Their Desks? Implications for the Design of Office Information Systems. ACM Trans. Office Information Systems, 1(1), 99--112. Google ScholarDigital Library
- Mander, R., Salomon, G., and Wong, Y. 1992. A 'Pile' Metaphor for Supporting Casual Organization of Information. Proc. ACM Conf. Human Factors in Computing Systems CHI'92 (Monterey, CA), 627--634. New York: ACM. Google ScholarDigital Library
- Palen, L. and Dourish, P. 2003. Unpacking "Privacy" for a Networked World. Proceedings of the ACM Conference on Human Factors in Computing Systems CHI 2003 (Fort Lauderdale, FL), 129--136. New York: ACM. Google ScholarDigital Library
- Schneier, B. 2000. Secrets and Lies: Digital Security in a Networked World. Wiley. Google ScholarDigital Library
- Terry, D. 1993. A Tour Through Tapestry. Proc. ACM Conf. Organizational Computing Systems (Milpetas, CA), 21--30. New York: ACM Press. Google ScholarDigital Library
- Weirich, D. and Sasse, M. A. 2001. Pretty Good Persuasion: A first step towards effective password security for the Real World. Proceedings of the New Security Paradigms Workshop 2001 (Sept. 10--13, Cloudcroft, NM), 137--143. ACM Press. Google ScholarDigital Library
- Whitten, A. and Tygar, D. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. Proc. 8th Usenix Security Symposium. Google ScholarDigital Library
Index Terms
- Social navigation as a model for usable security
Recommendations
The impact of social navigation on privacy policy configuration
SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and SecuritySocial navigation is a promising approach to help users make better privacy and security decisions using community knowledge and expertise. Social navigation has recently been applied to several privacy and security systems such as peer-to-peer file ...
Social translucence: an approach to designing systems that support social processes
Special issue on human-computer interaction in the new millennium, Part 1We are interested in desiging systems that support communication and collaboration among large groups of people over computing networks. We begin by asking what properties of the physical world support graceful human-human communication in face-to-face ...
Social navigation: modeling, simulation, and experimentation
AAMAS '03: Proceedings of the second international joint conference on Autonomous agents and multiagent systemsThe term social navigation refers to the process of seeking social interaction as a source of navigational support. In this paper we present a computational model of social navigation as an extension to an existing conceptual, non-computational model of ...
Comments