Security user studies: methodologies and best practices

Serge Egelman, J. King, Rob Miller, Nick Ragouzis, E. Poole
{"title":"Security user studies: methodologies and best practices","authors":"Serge Egelman, J. King, Rob Miller, Nick Ragouzis, E. Poole","doi":"10.1145/1240866.1241089","DOIUrl":null,"url":null,"abstract":"Interest in usable security -- the research, development, and study of systems that are both usable and secure -- has been growing both in the CHI and information security communities in the past several years. Despite this interest, however, the process of designing and conducting security-related user studies remains extremely difficult. Users deal with security infrequently and irregularly, and most do not notice or care about security until it is missing or broken. Security is rarely a primary goal or task of users, making many traditional HCI evaluation techniques difficult or even impossible to use. This workshop will bring together researchers and practitioners from the HCI and information security communities to explore methodological challenges and best practices for conducting security-related user studies.","PeriodicalId":294433,"journal":{"name":"CHI '07 Extended Abstracts on Human Factors in Computing Systems","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"CHI '07 Extended Abstracts on Human Factors in Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1240866.1241089","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21

Abstract

Interest in usable security -- the research, development, and study of systems that are both usable and secure -- has been growing both in the CHI and information security communities in the past several years. Despite this interest, however, the process of designing and conducting security-related user studies remains extremely difficult. Users deal with security infrequently and irregularly, and most do not notice or care about security until it is missing or broken. Security is rarely a primary goal or task of users, making many traditional HCI evaluation techniques difficult or even impossible to use. This workshop will bring together researchers and practitioners from the HCI and information security communities to explore methodological challenges and best practices for conducting security-related user studies.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
安全用户研究:方法和最佳实践
在过去的几年中,对可用安全性的兴趣——研究、开发和研究既可用又安全的系统——在CHI和信息安全社区中一直在增长。然而,尽管有这种兴趣,设计和执行与安全相关的用户研究的过程仍然非常困难。用户很少和不定期地处理安全性,并且大多数人在丢失或损坏安全性之前不会注意或关心安全性。安全性很少是用户的主要目标或任务,这使得许多传统的HCI评估技术难以使用,甚至无法使用。本次研讨会将汇集来自HCI和信息安全社区的研究人员和从业人员,探讨进行安全相关用户研究的方法挑战和最佳实践。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Supporting design studio culture in HCI Increasing the impact of usability work in software development A study of co-worker awareness in remote collaboration over a shared application Imaging the city: exploring the practices and technologies of representing the urban environment in HCI Comparing two methods for gesture based short text input using chording
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1