“Who decides?” Security and privacy in the wild

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, & Buys, Laurie (2013) “Who decides?” Security and privacy in the wild. In Calder, Paul & Shen, Haifeng (Eds.) Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration (OzCHI '13), Assocation for Computing Machinery (ACM), Flinders University, Adelaide, Australia, pp. 27-36.

View at publisher


Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.

Impact and interest:

1 citations in Scopus
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

89 since deposited on 19 Nov 2013
13 in the past twelve months

Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 64589
Item Type: Conference Paper
Refereed: Yes
Additional URLs:
Keywords: Online, Retail, Trust, Security, Diary Study, Phishing, Design, HCI, Participation
DOI: 10.1145/2541016.2541043
ISBN: 978-1-4503-2525-7
Subjects: Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)
Australian and New Zealand Standard Research Classification > BUILT ENVIRONMENT AND DESIGN (120000) > DESIGN PRACTICE AND MANAGEMENT (120300) > Digital and Interaction Design (120304)
Divisions: Current > Schools > School of Design
Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Creative Industries Faculty
Current > Institutes > Institute for Future Environments
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: ACM New York, NY, USA ©2013
Deposited On: 19 Nov 2013 01:02
Last Modified: 10 Apr 2014 06:27

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page