“Who decides?” Security and privacy in the wild
Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, & Buys, Laurie (2013) “Who decides?” Security and privacy in the wild. In Calder, Paul & Shen, Haifeng (Eds.) Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration (OzCHI '13), Assocation for Computing Machinery (ACM), Flinders University, Adelaide, Australia, pp. 27-36.
Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Conference Paper|
|Keywords:||Online, Retail, Trust, Security, Diary Study, Phishing, Design, HCI, Participation|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)
Australian and New Zealand Standard Research Classification > BUILT ENVIRONMENT AND DESIGN (120000) > DESIGN PRACTICE AND MANAGEMENT (120300) > Digital and Interaction Design (120304)
|Divisions:||Current > Schools > School of Design
Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Creative Industries Faculty
Current > Institutes > Institute for Future Environments
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||ACM New York, NY, USA ©2013|
|Deposited On:||19 Nov 2013 01:02|
|Last Modified:||10 Apr 2014 06:27|
Repository Staff Only: item control page