Social Navigation as a Model for Usable Security

Slides:



Advertisements
Similar presentations
Recommender System A Brief Survey.
Advertisements

Santa Fe Public Schools What is Inform?  Inform is a data warehouse provided by Pearson used to generate reports based upon students’ test scores.
UNIT 12 LO4 BE ABLE TO CREATE WEBSITES Cambridge Technicals.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Multimedia Communications Tejinder Judge Usable Security – CS 6204 – Fall, 2009.
The easy way to integrated communication.  Desknow will allow a user to share information with any other user on the system even if that user is in another.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy and Trust Frameworks/Systems Presented by Zalia Shams Usable Security –
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Childcare Study Edgardo & Zalia Usable Security – CS 6204 – Fall, 2009 – Dennis.
Robert J. Mislevy & Min Liu University of Maryland Geneva Haertel SRI International Robert J. Mislevy & Min Liu University of Maryland Geneva Haertel SRI.
George Lee User Context-based Service Control Group
The Vuel Concept: Towards a new way to manage Multiple Representations in Spatial Databases ISPRS / ICA Workshop Multi-Scale Representations of Spatial.
Usability Evaluation Evaluation should occur continually through the design and implementation process. Evaluation methods are applied as the interface.
SWE Introduction to Software Engineering
Evaluation Adam Bodnar CPSC 533C Monday, April 5, 2004.
GenSpace: Exploring Social Networking Metaphors for Knowledge Sharing and Scientific Collaborative Work Chris Murphy, Swapneel Sheth, Gail Kaiser, Lauren.
Information & Interaction Design Fall 2005 Bill Hart-Davidson Session 3: Team & Project intros; Activity Analysis; Phase 1 presentation and Memo guidelines;
Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Faculty of Computer Science Dalhousie University whalen at cs dot dal dot.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Medical Applications Tejinder Judge Usable Security – CS 6204 – Fall, 2009 – Dennis.
MS Access: Database Concepts Instructor: Vicki Weidler.
Usability Studies Encryption Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Why Johnnys' Network got Owned by Evil Hackers Bent on World Domination and Johnny.
Human Computer Interaction CS/ CM 348 Fall 2010 Class Camille Riviere.
A Brief Overview of Wikis for Teaching, Learning, and Research Jason Gorman Instructional Designer, HGSE Fall 2008.
Presented by Abirami Poonkundran.  Introduction  Current Work  Current Tools  Solution  Tesseract  Tesseract Usage Scenarios  Information Flow.
CS 235: User Interface Design October 15 Class Meeting Department of Computer Science San Jose State University Fall 2014 Instructor: Ron Mak
Nathaniel S. Good Aaron Krekelberg Usability and privacy: a study of Kazaa P2P file- sharing.
Brava for Open Text ECM SharePoint Connector Copyright © Open Text Corporation All rights reserved. Slide 1.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.
Evaluation and metrics: Measuring the effectiveness of virtual environments Doug Bowman Edited by C. Song.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Graphical Passwords Possible Collaborative Project Usable Security – CS 6204 – Fall,
User Interface Design & Usability for the Web Card Sorting You should now have a basic idea as to content requirements, functional requirements and user.
Designing for Asynchronous Collaboration Michael Bernstein Computer-Supported Cooperative Work 4/25/07 1.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy in Context: Contextual Integrity Peter Radics Usable Security – CS 6204.
Tag Clouds Presented By: Laura F. Bright February 27th, 2006 INF385T: Semantic Web Spring 2006 / Turnbull.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam
Towards understanding programs through wear-based filtering Robert DeLine Amir Khella Mary Czerwinski George Robertson Microsoft Corporation SoftVis 2005.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Using Geographic Information Systems for Enhanced Security Visualization Matthew.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Policy Authoring Matthew Dunlop Usable Security – CS 6204 – Fall, 2009 – Dennis.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Understand Internet Security LESSON Security Fundamentals.
CS223: Software Engineering Lecture 2: Introduction to Software Engineering.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: Matthew Dunlop Usable Security – CS 6204 –
Collaborative Query Previews in Digital Libraries Lin Fu, Dion Goh, Schubert Foo Division of Information Studies School of Communication and Information.
Understand Windows Services Software Development Fundamentals LESSON 5.3.
Objective: Learn to describe the relationships and extend the terms in arithmetic sequence.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Policy Systems Presented By: John Paul Dunning Usable Security – CS.
IPDA Architecture Project International Planetary Data Alliance IPDA Architecture Project Report.
REFLECTIONS ON THE SINGLE ASSESSMENT PROCESS AND THE HOUSING SECTOR DOES HOUSING REMAIN THE MISSING LINK?
Thoughts about variation and example spaces
Recruiter 2.0 Overview May 1, 2012.
Connecting Interface Metaphors to Support Creation of Path-based Collections Unmil P. Karadkar, Andruid Kerne, Richard Furuta, Luis Francisco-Revilla,
Semantic Web Foundations
Quality Case Practice Improvement
Ubiquitous Computing and Augmented Realities
Consistent URIs For Compliance Checking (1)
Web Mining Ref:
The 2007 Winter Conference on Business Intelligence
Groups.
Top 5 UX Rules That Every Designer Should Be Aware Of SpencerKinney | Menomonie Web DevelopmentMenomonie Web Development.
BSA 411 Competitive Success/snaptutorial.com
BSA 411 Education for Service/snaptutorial.com
BSA 411 Teaching Effectively-- snaptutorial.com
LLSS: Toward System Support for Plugging Privacy Leaks
EPIC INFOTECH CONSULTING GROUP
Ekaterina Prasolova-Førland
Purpose of meeting: Establish Team
Introduction to the Desktop Version of CIMSpy/CIMdesk (V 2.3)
Presentation transcript:

Social Navigation as a Model for Usable Security Paul DiGioia and Paul Dourish Presented by: Monika Akbar Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Background Bruce Schneier [15] has observed that “Security measures that aren’t understood and agreed to by everyone don’t work.” “The central concern here is that neither usability nor security can be added on to systems after the primary design work is done; rather, both need to be central aspects of the design effort.” Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Overview Social Navigation Social Navigation and Security Example Discussion

Social Navigation Dourish and Chalmers – Running out of Space: Models of Information Navigation Semantic navigation Social navigation Example Tapestry system “edit wear and read wear” Hill et al

Social Navigation “I took the one less traveled by, And that has made all the difference.” – Robert Frost

Application Collaborative Filtering Most visited Social Tagging Recommendation Engine

Overview Social Navigation Social Navigation and Security Example Discussion

Social Navigation and Security Fundamental approach: Allow people to assess how a system matches their needs Allow them to see the relationship between a system or information artifact and activities, either of their own or others. Application = ‘space’ People’s act = history of action displayed in the space Three approach: Show the history of a user’s action Show patterns of conventional use Show activities of others within a system

Overview Social Navigation Social Navigation and Security Example Show the history of a user’s action Show patterns of conventional use Show activities of others within a system Example Discussion

Show Patterns of Use – two metaphor Good and Krekelberg’s study of potential security issues in the Kazaa peer to peer file sharing application Mander et al, ‘pile’ metaphor for the informal grouping of files

Show Patterns of Conventional Use (Folder) Tradeoff between security & sharing of personal data Clumsy user interface of Kazaa Good and Krekelberg – users are unable to determine which files on their system were shared currently due to awakawrd teatement of folders by Kazaa interface. No method to compare sharing level Least Shared Most shared

Show Patterns of Conventional Use (Pile) Using Pile for Kazaa Pile preview will increase user awareness on Number of files being shared Repercussion of selecting a folder to share Types of files being selected for sharing. Design Physical metaphor for shared or secure doc Extending the design to support social navigation

Overview Social Navigation Social Navigation and Security Example Show the history of a user’s action Show patterns of conventional use Show activities of others within a system Example Discussion

Show activities of others System created – tidy More activity – messy

Overview Social Navigation Social Navigation and Security Example Show the history of a user’s action Show patterns of conventional use Show activities of others within a system Example Discussion

Example Impromptu

Discussion Visualization based approach Issues Application as a space populated by user Artifacts carry the evidence of activities over them Issues How to cope with the varying level of trust on the recipient side? Missing – Context

Thank you.