Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems 2021
DOI: 10.1145/3411764.3445164
|View full text |Cite
|
Sign up to set email alerts
|

Exploring User-Centered Security Design for Usable Authentication Ceremonies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(1 citation statement)
references
References 41 publications
0
1
0
Order By: Relevance
“…These sessions helped elicit user privacy aspirations and conceptual ideas but also helped us explore salient characteristics of our persona's (Table .2 that lead to specific behaviours. Participatory design approaches to understanding user-centered privacy and security design have recently been used to explore and scope the design space for usable security [16].…”
Section: Methodsmentioning
confidence: 99%
“…These sessions helped elicit user privacy aspirations and conceptual ideas but also helped us explore salient characteristics of our persona's (Table .2 that lead to specific behaviours. Participatory design approaches to understanding user-centered privacy and security design have recently been used to explore and scope the design space for usable security [16].…”
Section: Methodsmentioning
confidence: 99%