Workshop on Human-Computer Interaction and Security Systems
part of CHI2003, April 5-10, 2003, Fort Lauderdale, Florida
This workshop will seek to understand the roles and demands placed on users of security systems, and explore design solutions that can assist in making security systems usable and effective. In addition to examining end-users, this workshop will also examine the issues faced by security system developers and operators. The goal of the workshop is to build a network of interested people, share research activities and results, discuss high priority areas for research and development, and explore opportunities for collaboration.
NOTE: Each participant must read and be prepared to discuss all of the submissions before attending the workshop. Non-participants are also encouraged to read these papers and send question or comments to the authors and/or the HCISEC mailing list (see point 3 below).
|"Ten strikes and you’re out": Increasing the number of login attempts can improve password usability (revised February 18 2003)||Sacha Brostoff and Angela Sassefirstname.lastname@example.org||M. Angela Sasse|
|Authentication for Remote Voting||Nathanael Paul, David Evans, Avi Rubin and Dan Wallachemail@example.com||Nathanael Paul|
|Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery||M. Angela Sassefirstname.lastname@example.org||M. Angela Sasse|
|Designing a Privacy Preference Specification Interface: A Case Study||Lorrie Cranoremail@example.com||Lorrie Cranor|
|Designing Secure Yet Usable Credential Recovery Systems With Challenge Questions||Mike Just||Just.Mike@tbs-sct.gc.ca||Mike Just|
|Honest it's me! Self service verification||Lynne Coventry, Antonella De Angeli and Graham Johnson||lynnco@exchange.Scotland.NCR.COM||Lynne Coventry|
|NEW: How do consumers form their judgments of the security of e-commerce web sites? NOTE: paper e-mailed to workshop participants. Other people interested in reading it should contact Carl Turner.||Carl W. Turnerfirstname.lastname@example.org||Carl W. Turner|
|Lotus Notes And Domino Contribution to the HCI and Security Systems Workshop||Dave Wilson and Mary Ellen Zurko||Dave_Wilson@notesdev.ibm.com||Dave Wilson|
|Position Paper: Effective PKI Requires Effective HCI||Sean Smithemail@example.com||Sean Smith|
|Safe Staging for Computer Security||Alma Whitten and J.D. Tygar||alma@SIMS.Berkeley.EDU||Alma Whitten|
|Secure Interaction Design and the Principle of Least Authority||Ka-Ping Yeefirstname.lastname@example.org||Ka-Ping Yee|
|Security as a Practical Problem: Some Preliminary Observations of Everyday Mental Models||Paul Dourish, Jessica Delgado de la Flor, and Melissa Josephemail@example.com||Paul Dourish|
|Three Challenges for Embedding Security into Applications||Rebecca E. Grinter and D. K. Smettersfirstname.lastname@example.org||Rebecca Grinter|
|Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements (revised Feb 12 2003)||William Yurcik, James Barlow, Kiran Lakkaraju and Mike Habermanemail@example.com||James Barlow|
NOTE: all papers are in PDF format. A ZIP archive containing all the papers is also available here (1.5 MB) (revised Feb 18 2003).