Tag Project: Usable Security

Usable Security

The Pixi Lab is the host of the Tiger Team Student Design Competition for Usable Security. Held 2005-2007, this competition allows two-person student teams (representing both HCI and Security) to compete for funding to develop novel projects that address challenges of usable security. The competition has been supported generously by Symantec, IBM Internet Security Systems, and Google.

A Brief Introduction to Usable Security

Bryan D. Payne and W. Keith Edwards. “A Brief Introduction to Usable Security” In, IEEE Internet Computing, IEEE Press. Vol. 12, No. 3, May/June, 2008. pp. 13–21.

Sesame: Informing User Security Decisions with System Visualization

Jennifer Stoll, Craig Tashman, W. Keith Edwards, and Kyle Spafford, “Sesame: Informing User Security Decisions with System Visualization” In, Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2008). Florence, Italy. April 5–10, 2008.

TALC: Using Desktop Graffiti to Fight Software Vulnerability

Kandha Sankarpandian, Travis Little, and W. Keith Edwards. “TALC: Using Desktop Graffiti to Fight Software Vulnerability” In, Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2008). Florence, Italy. April 5–10, 2008.

Security Automation Considered Harmful?

W. Keith Edwards, Erika Shehan, Jennifer Stoll “Security Automation Considered Harmful?.” In, Proceedings of New Security Paradigms Workshop (NSPW). North Conway, New Hampshire, September 18–21, 2007.

Security User Studies: Methodologies and Best Practices

Serge Egelman, Jen King , Robert C. Miller, Nick Ragouzis, and Erika Shehan. “Security User Studies: Methodologies and Best Practices.” In, Extended abstracts of the ACM Conference on Human Factors in Computing Systems (CHI 2007). San Jose, California, April 28, 2007.