Participatory Design for Security-Related User Interfaces
暂无分享,去创建一个
Gottfried Wilhelm | Matthew Smith | Susanne Weber | Marian Harbach | Rheinische Friedrich-Wilhelms-UniversitBonn | Matthew Smith | M. Harbach | Susanne Weber | Gottfried Wilhelm | Rheinischen Friedrich-Wilhelms-UniversitBonn | Marian Harbach
[1] Sunny Consolvo,et al. Experimenting at scale with google chrome's SSL warning , 2014, CHI.
[2] Thomas Pfeiffer,et al. It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately , 2012, Sicherheit.
[3] Erik Frøkjær,et al. Designing daybuilder: an experimental app to support people with depression , 2012, PDC '12.
[4] Johannes Gärtner,et al. Bringing participatory design to practical application: the interrelation between LCD projection, facilitation, and participatory design , 1999, INTR.
[5] Clay Spinuzzi,et al. The Methodology of Participatory Design , 2005 .
[6] Susanne Bødker,et al. Experiencing security in interaction design , 2011, CHI.
[7] Kirstie Hawkey,et al. It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls , 2010, SafeConfig '10.
[8] Sara Eriksén,et al. Citizen-Driven Design: Leveraging Participatory Design of E-Government 2.0 Through Local and Global Collaborations , 2015 .
[9] Manfred Tscheligi,et al. Making Devices Trustworthy : Security and Trust Feedback in the Internet of Things , 2012 .
[10] Tone Bratteteig,et al. User Participation and Democracy: A Discussion of Scandinavian Research on System Development , 1995, Scand. J. Inf. Syst..
[11] Lorrie Faith Cranor,et al. Crying Wolf: An Empirical Study of SSL Warning Effectiveness , 2009, USENIX Security Symposium.
[12] Morten Kyng,et al. Cardboard Computers: Mocking-it-up or Hands-on the Future , 1992 .
[13] T. Sumner,et al. Evolution, not revolution: participatory design in the toolbelt era , 1997 .
[14] Douglas Schuler,et al. Participatory Design: Principles and Practices , 1993 .
[15] Lorrie Faith Cranor,et al. Bridging the Gap in Computer Security Warnings: A Mental Model Approach , 2011, IEEE Security & Privacy.
[16] Stephen Lindsay,et al. Engaging older people using participatory design , 2012, CHI.
[17] Matthew Smith,et al. Sorry, I Don't Get It: An Analysis of Warning Message Texts , 2013, Financial Cryptography Workshops.
[18] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[19] Adrienne Porter Felt,et al. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness , 2013, USENIX Security Symposium.