| |
| |
Preface | |
| |
| |
| |
Realigning Usability and Security | |
| |
| |
| |
Psychological Acceptability Revisited | |
| |
| |
| |
| |
Usable Security | |
| |
| |
| |
| |
Design for Usability | |
| |
| |
| |
| |
Usability Design and Evaluation for Privacy and Security Solutions | |
| |
| |
| |
| |
Designing Systems That People Will Trust | |
| |
| |
| |
| |
Authentication mechanisms | |
| |
| |
| |
Evaluating Authentication Mechanisms | |
| |
| |
| |
| |
The Memorability and Security of Passwords | |
| |
| |
| |
| |
Designing Authentication Systems with Challenge Questions | |
| |
| |
| |
| |
Graphical Passwords | |
| |
| |
| |
| |
Usable Biometrics | |
| |
| |
| |
| |
Identifying Users from Their Typing Patterns | |
| |
| |
| |
| |
The Usability of Security Devices | |
| |
| |
| |
| |
Secure Systems | |
| |
| |
| |
Guidelines and Strategies for Secure Interaction Design | |
| |
| |
| |
| |
Fighting Phishing at the User Interface | |
| |
| |
| |
| |
Sanitization and Usability | |
| |
| |
| |
| |
Making the Impossible Easy: Usable PKI | |
| |
| |
| |
| |
Simple Desktop Security with Chameleon | |
| |
| |
| |
| |
Security Administration Tools and Practices | |
| |
| |
| |
| |
Privacy and Anonymity Systems | |
| |
| |
| |
Privacy Issues and Human-Computer Interaction | |
| |
| |
| |
| |
A User-Centric Privacy Space Framework | |
| |
| |
| |
| |
Five Pitfalls in the Design for Privacy | |
| |
| |
| |
| |
Privacy Policies and Privacy Preferences | |
| |
| |
| |
| |
Privacy Analysis for the Casual User with Bugnosis | |
| |
| |
| |
| |
Informed Consent by Design | |
| |
| |
| |
| |
Social Approaches to End-User Privacy Management | |
| |
| |
| |
| |
Anonymity Loves Company: Usability and the Network Effect | |
| |
| |
| |
| |
Commercializing Usability: The Vendor Perspective | |
| |
| |
| |
ZoneAlarm: Creating Usable Security Products for Consumers | |
| |
| |
| |
| |
Firefox and the Worry-Free Web | |
| |
| |
| |
| |
Users and Trust: A Microsoft Case Study | |
| |
| |
| |
| |
IBM Lotus Notes/Domino: Embedding Security in Collaborative Applications | |
| |
| |
| |
| |
Achieving Usable Security in Groove Virtual Office | |
| |
| |
| |
| |
The Classics | |
| |
| |
| |
Users Are Not the Enemy | |
| |
| |
| |
| |
Usability and Privacy: A Study of KaZaA P2P File Sharing | |
| |
| |
| |
| |
Why Johnny Can't Encrypt | |
| |
| |
| |
Index | |