Share This Author
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
It is concluded that PGP 5.0 is not usable enough to provide effective security for most computer users, despite its attractive graphical user interface, supporting the hypothesis that user interface design for effective security remains an open problem.
Usability of Security: A Case Study,
This study studied the usability of PGP 5.0 to discover whether that was sufficient to enable non-programmers who know little about security to actually use it effectively, and concludes that PGP5.0 is not sufficiently usable to provide effective security for most users.
Making Security Usable
It is proposed that the usability problem for security is difficult to solve precisely because security presents qualitatively different types of usability challenges from those of other types of software, and it is suggested that making security usable will require the creation of user interface design methods that address those challenges.
WWW electronic commerce and java trojan horses
A general method is given, window personalization, that can thwart or prevent this attack on a consumer's machine using Java or similar remote execution facilities.
Safe Staging for Computer Security
The technique of safe staging for computer security is introduced, which is adapted from conventional user interface staging to meet the specific needs of computer security in consumer software.
Generative usability: security and user centered design beyond the appliance
In this position paper we consider the ways in which users can be given control over technology and information, considering the spectrum of design possibilities from 'generative component'…
Notes from the second USENIX workshop on electronic commerce
These are notes taken from the Second USENIX Workshop on Electronic Commerce from November 1996. They record presentations and questions from this workshop.
Engineering Privacy in an Age of Information Abundance
This paper offers a conceptualization of privacy within the context of information abundance and presents a set of engineering challenges that must be overcome to achieve it.
Electronic Commerce and Java Trojan HorsesJ
A general method is given, window personalization, that can thwart or prevent a trojan horse attack on a consumer's machine using Java or similar remote execution facilities.
Transparency and Choice: Protecting Consumer Privacy in an Online World
Tracking is often data collection that helps ensure the security and integrity of data, determines relevancy of served content and also helps create innovation opportunities, so this value ought to be central in any “Do Not Track” discussions.