Books & Videos

Table of Contents

  1. Realigning Usability and Security

    1. Chapter One Psychological Acceptability Revisited

      1. Passwords
      2. Patching
      3. Configuration
      4. Conclusion
      5. About the Author
    2. Chapter Two Why Do We Need It? How Do We Get It?

      1. Introduction
      2. Product: Human Factors, Policies, and Security Mechanisms
      3. Process: Applying Human Factors Knowledge and User-Centered Approaches to Security Design
      4. Panorama: Understanding the Importance of the Environment
      5. Conclusion
      6. About the Authors
    3. Chapter Three Design for Usability

      1. Death by Security
      2. Balance Security and Usability
      3. Balance Privacy and Security
      4. Build a Secure Internet
      5. Conclusion
      6. About the Author
    4. Chapter Four Usability Design and Evaluation for Privacy and Security Solutions

      1. Usability in the Software and Hardware Life Cycle
      2. Case Study: Usability Involvement in a Security Application
      3. Case Study: Usability Involvement in the Development of a Privacy Policy Management Tool
      4. Conclusion
      5. About the Authors
    5. Chapter Five Designing Systems That People Will Trust

      1. Introduction
      2. The Trust-Risk Relationship
      3. The Time-Course of Trust
      4. Models of Trust
      5. Trust Designs
      6. Future Research Directions
      7. About the Authors
  2. Authentication Mechanisms

    1. Chapter Six Evaluating Authentication Mechanisms

      1. Authentication
      2. Authentication Mechanisms
      3. Quality Criteria
      4. Environmental Considerations
      5. Choosing a Mechanism
      6. Conclusion
      7. About the Author
    2. Chapter Seven The Memorability and Security of Passwords

      1. Introduction
      2. Existing Advice on Password Selection
      3. Experimental Study
      4. Method
      5. Results
      6. Discussion
      7. Acknowledgments
      8. About the Authors
    3. Chapter Eight Designing Authentication Systems with Challenge Questions

      1. Challenge Questions as a Form of Authentication
      2. Criteria for Building and Evaluating a Challenge Question System
      3. Types of Questions and Answers
      4. Designing a Challenge Question Authentication System
      5. Some Examples of Current Practice
    4. Chapter Nine Graphical Passwords

      1. Introduction
      2. A Picture Is Worth a Thousand Words
      3. Picture Perfect?
      4. Let's Face It
      5. About the Authors
    5. Chapter Ten Usable Biometrics

      1. Introduction
      2. Where Are Biometrics Used?
      3. Biometrics and Public Technology: The ATM Example
      4. Evaluating Biometrics
      5. Incorporating User Factors into Testing
      6. Conclusion
      7. About the Author
    6. Chapter Eleven Identifying Users from Their Typing Patterns

      1. Typing Pattern Biometrics
      2. Applications
      3. Overview of Previous Research
      4. Evaluating Previous Research
      5. Privacy and Security Issues
      6. Conclusion
      7. About the Authors
    7. Chapter Twelve The Usability of Security Devices

      1. Introduction
      2. Overview of Security Devices
      3. Usability Testing of Security Devices
      4. A Usability Study of Cryptographic Smart Cards
      5. Recommendations and Open Research Questions
      6. Conclusion
      7. Acknowledgments
      8. About the Authors
  3. Secure Systems

    1. Chapter Thirteen Guidelines and Strategies for Secure Interaction Design

      1. Introduction
      2. Design Guidelines
      3. Design Strategies
      4. Conclusion
      5. Acknowledgments
      6. About the Author
    2. Chapter Fourteen Fighting Phishing at the User Interface

      1. Introduction
      2. Attack Techniques
      3. Defenses
      4. Looking Ahead
      5. About the Authors
    3. Chapter Fifteen Sanitization and Usability

      1. Introduction
      2. The Remembrance of Data Passed Study
      3. Related Work: Sanitization Standards, Software, and Practices
      4. Moving Forward: A Plan for Clean Computing
      5. Acknowledgments
      6. About the Author
    4. Chapter Sixteen Making the Impossible Easy: Usable PKI

      1. Public Key Infrastructures
      2. Problems with Public Key Infrastructures
      3. Making PKI Usable
      4. About the Authors
    5. Chapter Seventeen Simple Desktop Security with Chameleon

      1. Introduction
      2. Chameleon User Interface
      3. Chameleon Interface Development
      4. Chameleon Implementation
      5. Conclusion
      6. Acknowledgments
      7. About the Authors
    6. Chapter Eighteen Security Administration Tools and Practices

      1. Introduction
      2. Attacks, Detection, and Prevention
      3. Security Administrators
      4. Security Administration: Cases from the Field
      5. Conclusion
      6. Acknowledgments
      7. About the Authors
  4. Privacy and Anonymity Systems

    1. Chapter Ninteen Privacy Issues and Human-Computer Interaction

      1. Introduction
      2. Privacy and HCI
      3. Relevant HCI Research Streams
      4. Conclusion
      5. About the Authors
    2. Chapter Twenty A User-Centric Privacy Space Framework

      1. Introduction
      2. Security and Privacy Frameworks
      3. Researching the Privacy Space
      4. Privacy as a Process
      5. Conclusion
      6. About the Author
    3. Chapter Twenty One Five Pitfalls in the Design for Privacy

      1. Introduction
      2. Faces: (Mis)Managing Ubicomp Privacy
      3. Five Pitfalls to Heed When Designing for Privacy
      4. Discussion
      5. Conclusion
      6. Acknowledgments
      7. About the Authors
    4. Chapter Twenty Two Privacy Policies and Privacy Preferences

      1. Introduction
      2. The Platform for Privacy Preferences (P3P)
      3. Privacy Bird Design
      4. Privacy Bird Evaluation
      5. Beyond the Browser
      6. About the Author
    5. Chapter Twenty Three Privacy Analysis for the Casual User with Bugnosis

      1. Introduction
      2. The Audience for Bugnosis
      3. Cookies, Web Bugs, and User Tracking
      4. The Graphic Identity
      5. Making It Simple Is Complicated
      6. Looking Ahead
      7. Acknowledgments
      8. About the Author
    6. Chapter Twenty Four Informed Consent by Design

      1. Introduction
      2. A Model of Informed Consent for Information Systems
      3. Possibilities and Limitations for Informed Consent: Redesigning Cookie Handling in a Web Browser
      4. Informing Through Interaction Design: What Users Understand About Secure Connections Through Their Web Browsing
      5. The Scope of Informed Consent: Questions Motivated by Gmail
      6. Acknowledgments
      7. About the Authors
    7. Chapter Twenty Five Social Approaches to End-User Privacy Management

      1. A Concrete Privacy Problem
      2. Acumen: A Solution Using Social Processes
      3. Supporting Privacy Management Activities with Social Processes
      4. Deployment, Adoption, and Evaluation
      5. Gaming and Anti-gaming
      6. Generalizing Our Approach
      7. Conclusion
      8. About the Authors
    8. Chapter Twenty Six Anonymity Loves Company: Usability and the Network Effect

      1. Usability for Others Impacts Your Security
      2. Usability Is Even More Important for Privacy
      3. Bootstrapping, Confidence, and Reputability
      4. Technical Challenges to Guessing the Number of Users in a Network
      5. Conclusion
      6. About the Authors
  5. Commercializing Usability: The Vendor Perspective

    1. Chapter Twenty Seven ZoneAlarm: Creating Usable Security Products for Consumers

      1. About ZoneAlarm
      2. Design Principles
      3. Efficient Production for a Fast Market
      4. Conclusion
      5. About the Author
    2. Chapter Twenty Eight Firefox and the Worry-Free Web

      1. Usability and Security: Bridging the Gap
      2. The Five Golden Rules
      3. Conclusion
      4. About the Author
    3. Chapter Twenty Nine Users and Trust: A Microsoft Case Study

      1. Users and Trust
      2. Consent Dialogs
      3. Windows XP Service Pack 2—A Case Study
      4. Pop-Up Blocking
      5. The Ideal
      6. Conclusion
      7. About the Author
    4. Chapter Thirty IBM Lotus Notes/Domino: Embedding Security in Collaborative Applications

      1. Usable Secure Collaboration
      2. Embedding and Simplifying Public Key Security
      3. Designing Security Displays
      4. User Control of Active Content Security
      5. Conclusion
      6. About the Author
    5. Chapter Thirty One Achieving Usable Security in Groove Virtual Office

      1. About Groove Virtual Office
      2. Groove Virtual Office Design
      3. Administrators' Strengths and Weaknesses
      4. Security and Usability
      5. About the Authors
  6. The Classics

    1. Chapter Thirty Two Users Are Not the Enemy

      1. The Study
      2. Users Lack Security Knowledge
      3. Security Needs User-Centered Design
      4. Motivating Users
      5. Users and Password Behavior
      6. About the Authors
    2. Chapter Thirty Three Usability and Privacy: A Study of KaZaA P2P File Sharing

      1. Introduction
      2. Usability Guidelines
      3. Results of the Cognitive Walkthrough
      4. A Two-Part User Study
      5. Conclusion
      6. Acknowledgments
      7. About the Authors
    3. Chapter Thirty Four Why Johnny Can't Encrypt

      1. Introduction
      2. Understanding the Problem
      3. Evaluation Methods
      4. Cognitive Walkthrough
      5. User Test
      6. Conclusion
      7. Related Work
      8. Acknowledgments
      9. About the Authors
  1. Colophon