skip to main content
10.1145/1073001.1073011acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Social navigation as a model for usable security

Published: 06 July 2005 Publication History

Abstract

As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a number of researchers have examined. In this paper, we discuss the use of the social navigation paradigm as a way of organizing visual displays of system action. Drawing on a previous study of security in the Kazaa peer to peer system, we present some examples of the ways in which social navigation can be incorporated in support of usable security.

References

[1]
Brostoff, S. and Sasse, A. 2000. Are Passfaces More Usable than Passwords? A Field Trial Investigation. Proc. HCI'2000.
[2]
DePaula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D., Ren, J., Rode, J. and Silva Filho, R. 2005. In the Eye of the Beholder: A Visualization-based Approach to Information System Security. To appear in International Journal of Human-Computer Studies.
[3]
Dhamija, R. and Perrig, A. 2000. Déjà vu: A user study using images for authentication. In Proc. 9th USENIX Security Symposium (Denver, CO, USA, Aug. 2000).
[4]
Dourish, P. 2000. Towards an Infrastructure for Pervasive Recommendations. Position paper for the CHI 2000 Workshop on Social Navigation: A Design Approach.
[5]
Dourish, P. and Chalmers, M. 1994. Running Out of Space: Models of Information Navigation. Short paper presented at HCI'94 (Glasgow, UK).
[6]
Dourish, P. and Redmiles, D. 2002. An Approach to Usable Security Based on Event Monitoring and Visualization. Proceedings of the New Security Paradigms Workshop 2002 (Virginia Beach, VA).
[7]
Dourish, P., Grinter, R., Delgado de la Flor, J., and Joseph, M. 2004. Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitous Computing, 8(6), 391--401.
[8]
Good, N. and Krekelberg, A. 2003. Usability and Privacy: A Study of Kazaa File Sharing. Proceedings of the ACM Conference on Human Factors in Computing Systems CHI 2003 (Fort Lauderdale, FL), 137--145. New York: ACM.
[9]
Hill, W., Hollan, J., Wroblewski, D., and McCandless, J. 1992. Edit Wear and Read Wear. Proc. ACM Conf. Human Factors in Computing Systems CHI'92 (Monterey, CA), 3--9. New York: ACM.
[10]
Höök, K., Benyon, D., and Munro, A. 2003. Designing Information Systems: The Social Navigation Approach. Springer.
[11]
Kirsh, D. 1995. The Intelligent use of Space. Artificial Intelligence, 73(1--2), 31--68.
[12]
Malone, T. 1983. How Do People Organize Their Desks? Implications for the Design of Office Information Systems. ACM Trans. Office Information Systems, 1(1), 99--112.
[13]
Mander, R., Salomon, G., and Wong, Y. 1992. A 'Pile' Metaphor for Supporting Casual Organization of Information. Proc. ACM Conf. Human Factors in Computing Systems CHI'92 (Monterey, CA), 627--634. New York: ACM.
[14]
Palen, L. and Dourish, P. 2003. Unpacking "Privacy" for a Networked World. Proceedings of the ACM Conference on Human Factors in Computing Systems CHI 2003 (Fort Lauderdale, FL), 129--136. New York: ACM.
[15]
Schneier, B. 2000. Secrets and Lies: Digital Security in a Networked World. Wiley.
[16]
Terry, D. 1993. A Tour Through Tapestry. Proc. ACM Conf. Organizational Computing Systems (Milpetas, CA), 21--30. New York: ACM Press.
[17]
Weirich, D. and Sasse, M. A. 2001. Pretty Good Persuasion: A first step towards effective password security for the Real World. Proceedings of the New Security Paradigms Workshop 2001 (Sept. 10--13, Cloudcroft, NM), 137--143. ACM Press.
[18]
Whitten, A. and Tygar, D. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. Proc. 8th Usenix Security Symposium.

Cited By

View all
  • (2024)A Unified Approach to the Development of Technology-Based Software Quality Models on the Example of Blockchain SystemsIEEE Access10.1109/ACCESS.2024.344827112(118875-118889)Online publication date: 2024
  • (2023)Evaluating the impact of community oversight for managing mobile privacy and securityProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632210(437-456)Online publication date: 7-Aug-2023
  • (2022)"Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social MediaProceedings of the ACM on Human-Computer Interaction10.1145/35551546:CSCW2(1-27)Online publication date: 11-Nov-2022
  • Show More Cited By

Index Terms

  1. Social navigation as a model for usable security

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security
      July 2005
      123 pages
      ISBN:1595931783
      DOI:10.1145/1073001
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 06 July 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. collaborative interfaces
      2. peer-to-peer filesharing
      3. social navigation
      4. visualization

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate 15 of 49 submissions, 31%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)14
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Unified Approach to the Development of Technology-Based Software Quality Models on the Example of Blockchain SystemsIEEE Access10.1109/ACCESS.2024.344827112(118875-118889)Online publication date: 2024
      • (2023)Evaluating the impact of community oversight for managing mobile privacy and securityProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632210(437-456)Online publication date: 7-Aug-2023
      • (2022)"Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social MediaProceedings of the ACM on Human-Computer Interaction10.1145/35551546:CSCW2(1-27)Online publication date: 11-Nov-2022
      • (2022)To Self-Persuade or be Persuaded: Examining Interventions for Users’ Privacy Setting SelectionProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3502009(1-17)Online publication date: 29-Apr-2022
      • (2022)SoK: Social Cybersecurity2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833757(1863-1879)Online publication date: May-2022
      • (2021)What breach? Measuring online awareness of security incidents by studying real-world browsing behaviorProceedings of the 2021 European Symposium on Usable Security10.1145/3481357.3481517(180-199)Online publication date: 11-Oct-2021
      • (2021)A Generic Framework and Library for Exploration of Small Multiples through Interactive PilingIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2020.302894827:2(358-368)Online publication date: Feb-2021
      • (2019)A typology of perceived triggers for end-user security and privacy behaviorsProceedings of the Fifteenth USENIX Conference on Usable Privacy and Security10.5555/3361476.3361484(97-115)Online publication date: 12-Aug-2019
      • (2019)Co-designing for Community OversightProceedings of the ACM on Human-Computer Interaction10.1145/33592483:CSCW(1-31)Online publication date: 7-Nov-2019
      • (2018)Towards a Model of Social Media Impacts on Cybersecurity Knowledge TransferCyber Security and Threats10.4018/978-1-5225-5634-3.ch028(521-543)Online publication date: 2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media