skip to main content
10.1145/1978942.1979283acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Experiencing security in interaction design

Published:07 May 2011Publication History

ABSTRACT

Security is experienced differently in different contexts. This paper argues that in everyday situations, users base their security decisions on a mix of prior experiences. When approaching security and interaction design from an experience approach, tools that help bring out such relevant experiences for design are needed. This paper reports on how Prompted exploration workshops and Acting out security were developed to target such experiences when iteratively designing a mobile digital signature solution in a participatory design process. We discuss how these tools helped the design process and illustrate how the tangibility of such tools matters. We further demonstrate how the approach grants access to non-trivial insights into people's security experience. We point out how the specific context is essential for exploring the space between experience and expectations, and we illustrate how people activate their collections of security experiences rather than deploying one security strategy in all situations.

References

  1. Adams, A. and Sasse, M. A. Users are not the enemy. CACM 42, 12 (1999) 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Braz, C., Seffah, A., & M'Raihi, D.. Designing a Trade-Off Between Usability and Security: A Metrics Based-Model. In Proc. INTERACT 2007, LNCS 4663 (2007), Part II, 114 -- 126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bødker, S. When second wave HCI meets third wave challenges. Proc. NordiCHI 2006, ACM (2006), 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bødker, S. and Christiansen, E. Scenarios as springboards in design. In Bowker, G., Gasser, L., Star, S.L. & Turner, W. (eds.), Social science research, technical systems and cooperative work. Erlbaum (1997), 217--234.Google ScholarGoogle Scholar
  5. Bødker, S. & Christiansen, E. Designing for ephemerality and prototypicality. Proc. DIS 2004 (2004) 255 - 260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bødker, S. and Klokmose, C.N. (in press). The Human-Artifact Model. Journal of HCI (2011.Google ScholarGoogle Scholar
  7. Dindler, C. and Iversen, O. S. Fictional Inquiry - Design Collaboration in a Shared Narrative Space, Journal of CoDesign 3(4) (2007), 213--234.Google ScholarGoogle ScholarCross RefCross Ref
  8. Ehn, P. and Sjögren, D. From System Descriptions to Scripts for Action. In {10} (1991) 241--268. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Engeström, Y. and Middleton, D. (Eds.). Cognition and Communication at Work, Cambridge University Press (1996), 130--15.Google ScholarGoogle ScholarCross RefCross Ref
  10. Greenbaum, J. and Kyng M. (eds.). Design at Work: Cooperative Design of Computer Systems, Hillsdale NJ: Lawrence Erlbaum Associates (1991). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Halskov, K. and Dalsgaard, P. The emergence of ideas: the interplay between sources of inspiration and emerging design concepts. CoDesign: International Journal of CoCreation in Design and the Arts 3(4) (2007), 185 -- 211.Google ScholarGoogle ScholarCross RefCross Ref
  12. Lampson, B. Privacy and security. Usable security: how to get it. CACM 52(11) (2009). 25--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Landau, S. Privacy and security. A multidimensional problem. CACM 51(11) (2008). 25--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kyng, M. Users and Computers - A Contextual Approach to Design of Computer Artifacts. DAIMI PB-507 (1995).Google ScholarGoogle Scholar
  15. Mathiasen, N. and Bødker, S. Threats or threads: from usable security to secure experience, Proc. NordiCHI 2008, Society for Industrial and Applied Mathematics, (2008). 283--290. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. McCarthy, J. and Wright, P. Technology As Experience. MIT Press (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. McCarthy, J., and Wright, P. Experience-Centered Design. Designers, Users, and Communities in Dialogue. Morgan & Claypool (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mogensen, P., and Trigg, R. Artifacts as triggers for participatory analysis. In Proc. PDC 1992 (1992), 55--62.Google ScholarGoogle ScholarCross RefCross Ref
  19. Norman, D.. The Way I See It. When security gets in the way. interactions 16(6) (2009), 60--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ricoeur, P. Time and Narrative, Volume 3. Chicago, University of Chicago Press (1988).Google ScholarGoogle Scholar
  21. Schön, D. The reflective practitioner. Temple Smith (1983).Google ScholarGoogle Scholar
  22. Whitten, A and Tygar, D. Why Johnny Can't Encrypt -- A Usability Evaluation of PGP 5.0. In Cranor, L. & Simson, G. (eds). Security and Usability: Designing Secure Systems that People Can Use, O'Reilly (2005), 679--700..Google ScholarGoogle Scholar

Index Terms

  1. Experiencing security in interaction design
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
        May 2011
        3530 pages
        ISBN:9781450302289
        DOI:10.1145/1978942

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 May 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CHI '11 Paper Acceptance Rate410of1,532submissions,27%Overall Acceptance Rate6,199of26,314submissions,24%

        Upcoming Conference

        CHI '24
        CHI Conference on Human Factors in Computing Systems
        May 11 - 16, 2024
        Honolulu , HI , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader