Panel: Humans and Technology for Inclusive Privacy and Security

Computer security and user privacy are critical issues and concerns in the digital era due to both increasing users and threats to their data. Separate issues arise between generic cybersecurity guidance (i.e., protect all user data from malicious threats) and the individualistic approach of privacy (i.e., specific to users and dependent on user needs and risk perceptions). Research has shown that several securityand privacy-focused vulnerabilities are technological (e.g., software bugs (​Streiff, Kenny, Das, Leeth, & Camp, 2018​), insecure authentication (​Das, Wang, Tingle, & Camp, 2019)), ​or behavioral (e.g., sharing passwords (​Das, Dingman, ​& Camp, 2018​); and compliance (​Das, Dev, & Srinivasan, 2018) (​Dev, Das, Rashidi, & Camp, 2019)). ​This panel proposal addresses a third category of sociotechnical vulnerabilities that can and sometimes do arise from non-inclusive design of security and privacy. In this panel, we will address users’ needs and desires for privacy. The panel will engage in in-depth discussions about value-sensitive design while focusing on potentially vulnerable populations, such as older adults, teens, persons with disabilities, and others who are not typically emphasized in general security and privacy concerns. Human factors have a stake in and ability to facilitate improvements in these areas.

[1]  Ada Lerner,et al.  Privacy and Activism in the Transgender Community , 2020, CHI.

[2]  L. J. Camp,et al.  User-Centered Risk Communication for Safer Browsing , 2020, Financial Cryptography Workshops.

[3]  Cleotilde Gonzalez,et al.  Opportunities and Challenges for Human-Machine Teaming in Cybersecurity Operations , 2019 .

[4]  Kylie M. Gomes,et al.  HFE in Diversity, Inclusion and Social Justice: A Practical Primer , 2019, Proceedings of the Human Factors and Ergonomics Society Annual Meeting.

[5]  D. Cosley,et al.  Panel: Research Sponsors for Cybersecurity Research and the Human Factor , 2019, Proceedings of the Human Factors and Ergonomics Society Annual Meeting.

[6]  Erin K. Chiou,et al.  Advancing Diversity, Inclusion, and Social Justice Through Human Systems Engineering , 2019 .

[7]  L. Jean Camp,et al.  Evaluating User Perception of Multi-Factor Authentication: A Systematic Review , 2019, HAISA.

[8]  Christena Nippert-Eng,et al.  All About Phishing: Exploring User Research through a Systematic Literature Review , 2019, HAISA.

[9]  L. Jean Camp,et al.  Personalized WhatsApp Privacy: Demographic and Cultural Influences on Indian and Saudi Users , 2019, SSRN Electronic Journal.

[10]  Lawrie Brown,et al.  Computer Security: Principles and Practice , 2007 .

[11]  Sanchari Das Towards Implementing Inclusive Authentication Technologies for Older Adults , 2019 .

[12]  Sanchari Das,et al.  Modularity is the Key A New Approach to Social Media Privacy Policies , 2018, MexIHC.

[13]  Rupa S. Valdez,et al.  Human Factors and Ergonomics in Diversity, Inclusion and Social Justice Research , 2018, Proceedings of the Human Factors and Ergonomics Society Annual Meeting.

[14]  Yang Wang,et al.  Inclusive Security and Privacy , 2018, IEEE Security & Privacy.

[15]  L. Jean Camp,et al.  Poster Abstract: Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears , 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI).

[16]  L. Jean Camp,et al.  Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key , 2018, Financial Cryptography.

[17]  Erin K. Chiou,et al.  The HFES Diversity Committee: Challenges and Opportunities for Involvement , 2017 .

[18]  L. Jean Camp,et al.  Factors in an end user security expertise instrument , 2017, Inf. Comput. Secur..

[19]  Pamela Briggs,et al.  An Inclusive, Value Sensitive Design Perspective on Future Identity Technologies , 2015, TCHI.

[20]  P. Hancock,et al.  The Human Factors of Cyber Network Defense , 2015 .

[21]  A. Acquisti,et al.  The More Social Cues, The Less Trolling? An Empirical Study of Online Commenting Behavior , 2013 .

[22]  Alan Borning,et al.  Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.

[23]  M. Angela Sasse,et al.  Why Trust Seals Don't Work: A Study of User Perceptions and Behavior , 2012, TRUST.

[24]  L. Jean Camp,et al.  DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home , 2011, Journal of Medical Systems.

[25]  Krzysztof Z. Gajos,et al.  Ability-Based Design: Concept, Principles and Examples , 2011, TACC.

[26]  A. Alavi,et al.  Opportunities and Challenges , 1998, In Vitro Diagnostic Industry in China.