ABSTRACT
Security is experienced differently in different contexts. This paper argues that in everyday situations, users base their security decisions on a mix of prior experiences. When approaching security and interaction design from an experience approach, tools that help bring out such relevant experiences for design are needed. This paper reports on how Prompted exploration workshops and Acting out security were developed to target such experiences when iteratively designing a mobile digital signature solution in a participatory design process. We discuss how these tools helped the design process and illustrate how the tangibility of such tools matters. We further demonstrate how the approach grants access to non-trivial insights into people's security experience. We point out how the specific context is essential for exploring the space between experience and expectations, and we illustrate how people activate their collections of security experiences rather than deploying one security strategy in all situations.
- Adams, A. and Sasse, M. A. Users are not the enemy. CACM 42, 12 (1999) 40--46. Google ScholarDigital Library
- Braz, C., Seffah, A., & M'Raihi, D.. Designing a Trade-Off Between Usability and Security: A Metrics Based-Model. In Proc. INTERACT 2007, LNCS 4663 (2007), Part II, 114 -- 126. Google ScholarDigital Library
- Bødker, S. When second wave HCI meets third wave challenges. Proc. NordiCHI 2006, ACM (2006), 1--8. Google ScholarDigital Library
- Bødker, S. and Christiansen, E. Scenarios as springboards in design. In Bowker, G., Gasser, L., Star, S.L. & Turner, W. (eds.), Social science research, technical systems and cooperative work. Erlbaum (1997), 217--234.Google Scholar
- Bødker, S. & Christiansen, E. Designing for ephemerality and prototypicality. Proc. DIS 2004 (2004) 255 - 260. Google ScholarDigital Library
- Bødker, S. and Klokmose, C.N. (in press). The Human-Artifact Model. Journal of HCI (2011.Google Scholar
- Dindler, C. and Iversen, O. S. Fictional Inquiry - Design Collaboration in a Shared Narrative Space, Journal of CoDesign 3(4) (2007), 213--234.Google ScholarCross Ref
- Ehn, P. and Sjögren, D. From System Descriptions to Scripts for Action. In {10} (1991) 241--268. Google ScholarDigital Library
- Engeström, Y. and Middleton, D. (Eds.). Cognition and Communication at Work, Cambridge University Press (1996), 130--15.Google ScholarCross Ref
- Greenbaum, J. and Kyng M. (eds.). Design at Work: Cooperative Design of Computer Systems, Hillsdale NJ: Lawrence Erlbaum Associates (1991). Google ScholarDigital Library
- Halskov, K. and Dalsgaard, P. The emergence of ideas: the interplay between sources of inspiration and emerging design concepts. CoDesign: International Journal of CoCreation in Design and the Arts 3(4) (2007), 185 -- 211.Google ScholarCross Ref
- Lampson, B. Privacy and security. Usable security: how to get it. CACM 52(11) (2009). 25--27. Google ScholarDigital Library
- Landau, S. Privacy and security. A multidimensional problem. CACM 51(11) (2008). 25--26. Google ScholarDigital Library
- Kyng, M. Users and Computers - A Contextual Approach to Design of Computer Artifacts. DAIMI PB-507 (1995).Google Scholar
- Mathiasen, N. and Bødker, S. Threats or threads: from usable security to secure experience, Proc. NordiCHI 2008, Society for Industrial and Applied Mathematics, (2008). 283--290. Google ScholarDigital Library
- McCarthy, J. and Wright, P. Technology As Experience. MIT Press (2004). Google ScholarDigital Library
- McCarthy, J., and Wright, P. Experience-Centered Design. Designers, Users, and Communities in Dialogue. Morgan & Claypool (2010). Google ScholarDigital Library
- Mogensen, P., and Trigg, R. Artifacts as triggers for participatory analysis. In Proc. PDC 1992 (1992), 55--62.Google ScholarCross Ref
- Norman, D.. The Way I See It. When security gets in the way. interactions 16(6) (2009), 60--63. Google ScholarDigital Library
- Ricoeur, P. Time and Narrative, Volume 3. Chicago, University of Chicago Press (1988).Google Scholar
- Schön, D. The reflective practitioner. Temple Smith (1983).Google Scholar
- Whitten, A and Tygar, D. Why Johnny Can't Encrypt -- A Usability Evaluation of PGP 5.0. In Cranor, L. & Simson, G. (eds). Security and Usability: Designing Secure Systems that People Can Use, O'Reilly (2005), 679--700..Google Scholar
Index Terms
- Experiencing security in interaction design
Recommendations
Quantifying developers' adoption of security tools
ESEC/FSE 2015: Proceedings of the 2015 10th Joint Meeting on Foundations of Software EngineeringSecurity tools could help developers find critical vulnerabilities, yet such tools remain underused. We surveyed developers from 14 companies and 5 mailing lists about their reasons for using and not using security tools. The resulting thirty-nine ...
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
The role of design fiction in participatory design processes
NordiCHI '18: Proceedings of the 10th Nordic Conference on Human-Computer InteractionParticipatory design is in essence very malleable as any design technique could lend itself to it, as long as users and stakeholders are involved. Design fictions however, have more often been used as either a vehicle for critical designs, or as a sheer ...
Comments