Proceedings of the 2014 New Security Paradigms Workshop 2014
DOI: 10.1145/2683467.2683475
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the Experience-Centeredness of Privacy and Security Technologies

Abstract: The joint study of computer security, privacy and humancomputer interaction (HCI) over the last two decades has shaped a research agenda focused upon usable privacy & security. However, in HCI research more generally there has long been an awareness of the need to understand and design for user experience, in recognition of the complex and multi-faceted role that technology now plays in our lives. In this paper we add to the growing discussion by introducing the notion of experiencecentered privacy and securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 33 publications
(28 citation statements)
references
References 45 publications
0
28
0
Order By: Relevance
“…All participants gave informed consent and received a $100 gift card at the beginning of their session; the incentive amount was approved by the agencies and our organization's internal ethics review. For the remainder of the session, we used an experience-centered approach, focusing on participant experiences with technology and online privacy and security [17]. It consisted of a 5-question "ice breaker" survey about device and account use, a semi-structured interview about experiences related to digital privacy and security, and a card sort about their privacy and security practices.…”
Section: Procedures and Data Collectedmentioning
confidence: 99%
See 1 more Smart Citation
“…All participants gave informed consent and received a $100 gift card at the beginning of their session; the incentive amount was approved by the agencies and our organization's internal ethics review. For the remainder of the session, we used an experience-centered approach, focusing on participant experiences with technology and online privacy and security [17]. It consisted of a 5-question "ice breaker" survey about device and account use, a semi-structured interview about experiences related to digital privacy and security, and a card sort about their privacy and security practices.…”
Section: Procedures and Data Collectedmentioning
confidence: 99%
“…Understanding the unique digital privacy and security experiences and challenges of such user populations is important for designers who wish to help them better navigate and deploy privacy and security controls online and on their devices. Furthermore, understanding the unique challenges of specific populations can help designers improve technology for both that specific population and the broader population [17].…”
Section: Introductionmentioning
confidence: 99%
“…While our focus was on ASD, we felt that our results could be more broadly applicable. Our use of RPs to augment a traditional focus group discussion was motivated by similar approaches for novel user engagements to better understand their security and privacy needs [11,14].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, we used collaborative collage as the method for engaging with participants and gathering data. Collaborative collage is one of the engagement tools termed "creative security methods" [19]. It uses collaging techniques to enable small groups to discuss research questions and present their views in a collage produced on paper.…”
Section: Methodsmentioning
confidence: 99%