ABSTRACT
To counter the increasing number of online threats for users' privacy and security, this paper explores the design of an ambient security indicator, in form of a standard keyboard illuminated in different colors, and equipped with additional buttons and vibration functionality. We present the results of a focus group study, which notably influenced the design, and discuss a prototypical implementation called Moody Board.
- Adams, A. and Sasse, M. A. 1999. Users are not the enemy. Commun. ACM 42, 12 (Dec. 1999). Google ScholarDigital Library
- Amer, T. S., Maris, J. B. Signal words and signal icons in application control and information technology exception messages -- hazard matching and habituation effects. Technical Report Working Paper. Series 06--05, Northern Arizona University, Flagstaff, AZ, October 2006.Google Scholar
- Egelman, S., Cranor, L. F., and Hong, J. 2008. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceedings of CHI 2008, Florence, Italy, April 05--10. Google ScholarDigital Library
- Fogg, B. J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P., and Treinen, M. 2001. What makes Web sites credible?: a report on a large quantitative study. In Proceedings of CHI 2001, Seattle, Washington, United States. Google ScholarDigital Library
- Lampson, B. 2009. Privacy and security. Usable security: how to get it. Commun. ACM 52, 11 (Nov. 2009), 25--27. Google ScholarDigital Library
- Mankoff, J., Dey, A. K., Hsieh, G., Kientz, J., Lederer, S., and Ames, M. Heuristic evaluation of ambient displays. In Proceedings of CHI 2003, Ft. Lauderdale, Florida, USA, April 05--10. Google ScholarDigital Library
- Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L. F. Crying Wolf: An empirical study of SSL warning effectiveness. In Proceedings of the 18th USENIX Security Symposium. Google ScholarDigital Library
Index Terms
- On the design of a "moody" keyboard
Recommendations
Internet of Things (IoT): From awareness to continued use
AbstractThis paper proposes a research model with five constructs, i.e., IoT awareness, users’ IoT privacy knowledge, users’ IoT security knowledge, users’ IoT Trust, and continued intention to use IoT to bring clarity to the growing yet ...
Highlights- Clarifying how variables linked from IoT awareness to IoT continued use.
- IoT ...
Does MoodyBoard make internet use more secure?: evaluating an ambient security visualization tool
CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsInternet users are targets for ever-advancing phishing- and other attacks. The risks are, for example, to disclose credit card information or passwords to unauthorized instances. One approach to help users with insecure situations is provided by ...
Single display privacyware: augmenting public displays with private information
CHI '01: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsThe research area of Single Display Groupware (SDG) confronts the standard model of computing interaction, one user working on one computer, by investigating how the best support groups of users interacting with a shared display. One problem that has ...
Comments