skip to main content
10.1145/1073001.1073011acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Social navigation as a model for usable security

Published:06 July 2005Publication History

ABSTRACT

As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a number of researchers have examined. In this paper, we discuss the use of the social navigation paradigm as a way of organizing visual displays of system action. Drawing on a previous study of security in the Kazaa peer to peer system, we present some examples of the ways in which social navigation can be incorporated in support of usable security.

References

  1. Brostoff, S. and Sasse, A. 2000. Are Passfaces More Usable than Passwords? A Field Trial Investigation. Proc. HCI'2000.Google ScholarGoogle Scholar
  2. DePaula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D., Ren, J., Rode, J. and Silva Filho, R. 2005. In the Eye of the Beholder: A Visualization-based Approach to Information System Security. To appear in International Journal of Human-Computer Studies. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Dhamija, R. and Perrig, A. 2000. Déjà vu: A user study using images for authentication. In Proc. 9th USENIX Security Symposium (Denver, CO, USA, Aug. 2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dourish, P. 2000. Towards an Infrastructure for Pervasive Recommendations. Position paper for the CHI 2000 Workshop on Social Navigation: A Design Approach.Google ScholarGoogle Scholar
  5. Dourish, P. and Chalmers, M. 1994. Running Out of Space: Models of Information Navigation. Short paper presented at HCI'94 (Glasgow, UK).Google ScholarGoogle Scholar
  6. Dourish, P. and Redmiles, D. 2002. An Approach to Usable Security Based on Event Monitoring and Visualization. Proceedings of the New Security Paradigms Workshop 2002 (Virginia Beach, VA). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dourish, P., Grinter, R., Delgado de la Flor, J., and Joseph, M. 2004. Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitous Computing, 8(6), 391--401. Google ScholarGoogle ScholarCross RefCross Ref
  8. Good, N. and Krekelberg, A. 2003. Usability and Privacy: A Study of Kazaa File Sharing. Proceedings of the ACM Conference on Human Factors in Computing Systems CHI 2003 (Fort Lauderdale, FL), 137--145. New York: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hill, W., Hollan, J., Wroblewski, D., and McCandless, J. 1992. Edit Wear and Read Wear. Proc. ACM Conf. Human Factors in Computing Systems CHI'92 (Monterey, CA), 3--9. New York: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Höök, K., Benyon, D., and Munro, A. 2003. Designing Information Systems: The Social Navigation Approach. Springer.Google ScholarGoogle Scholar
  11. Kirsh, D. 1995. The Intelligent use of Space. Artificial Intelligence, 73(1--2), 31--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Malone, T. 1983. How Do People Organize Their Desks? Implications for the Design of Office Information Systems. ACM Trans. Office Information Systems, 1(1), 99--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Mander, R., Salomon, G., and Wong, Y. 1992. A 'Pile' Metaphor for Supporting Casual Organization of Information. Proc. ACM Conf. Human Factors in Computing Systems CHI'92 (Monterey, CA), 627--634. New York: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Palen, L. and Dourish, P. 2003. Unpacking "Privacy" for a Networked World. Proceedings of the ACM Conference on Human Factors in Computing Systems CHI 2003 (Fort Lauderdale, FL), 129--136. New York: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Schneier, B. 2000. Secrets and Lies: Digital Security in a Networked World. Wiley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Terry, D. 1993. A Tour Through Tapestry. Proc. ACM Conf. Organizational Computing Systems (Milpetas, CA), 21--30. New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Weirich, D. and Sasse, M. A. 2001. Pretty Good Persuasion: A first step towards effective password security for the Real World. Proceedings of the New Security Paradigms Workshop 2001 (Sept. 10--13, Cloudcroft, NM), 137--143. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Whitten, A. and Tygar, D. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. Proc. 8th Usenix Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Social navigation as a model for usable security

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security
        July 2005
        123 pages
        ISBN:1595931783
        DOI:10.1145/1073001

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 July 2005

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate15of49submissions,31%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader