Blog
About

160
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Towards the Systematic Development of Contextualized Security Interventions1

      ,

      The 26th BCS Conference on Human Computer Interaction (HCI)

      Human Computer Interaction

      12 - 14 September 2012

      Security intervention, security communication, usability engineering

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Current warnings during daily Web browsing demonstrate how difficult it is for developers to craft precise and comprehensible security interventions. While researchers have found that personal contextualization of interventions help in security-critical applications, taking this approach leads to an overwhelming range of options of how and when to intervene as well as which factors to consider. To make contextualized security interventions feasible, we need to support developers in selecting the relevant factors for their applications and support them in deriving the appropriate intervention strategy and content. In this paper, we propose a security intervention framework and methodology which provides such a support.

          Related collections

          Most cited references 7

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          The Emperor's New Security Indicators

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Do security toolbars actually prevent phishing attacks?

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Decision strategies and susceptibility to phishing

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2012
                September 2012
                : 1-4
                Affiliations
                CASED – TU Darmstadt

                Darmstadt, Germany
                Article
                10.14236/ewic/HCI2012.69
                © Steffen Bartsch et al. Published by BCS Learning and Development Ltd. The 26th BCS Conference on Human Computer Interaction, Birmingham, UK

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                The 26th BCS Conference on Human Computer Interaction
                HCI
                26
                Birmingham, UK
                12 - 14 September 2012
                Electronic Workshops in Computing (eWiC)
                Human Computer Interaction
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article