메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Revealing hidden context: Improving mental models of personal firewall users

Author keywords

Configuration; Firewall; Mental model; Usable security

Indexed keywords

CONFIGURATION; FIREWALL; HIDDEN CONTEXT; MENTAL MODEL; NETWORK LOCATION; PERSONAL FIREWALLS; UNDERLYING SYSTEMS; USABLE SECURITY; WINDOWS VISTA;

EID: 70350733771     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1572532.1572534     Document Type: Conference Paper
Times cited : (28)

References (35)
  • 3
    • 70350743534 scopus 로고    scopus 로고
    • G. Chen and D. Kotz. A survey of context-aware mobile computing research. Technical Report TR2000-381, Dartmouth College, 2000.
    • G. Chen and D. Kotz. A survey of context-aware mobile computing research. Technical Report TR2000-381, Dartmouth College, 2000.
  • 4
    • 70350738887 scopus 로고    scopus 로고
    • S. Chiasson, P. C. van Oorschot, and R. Biddle. Even experts deserve usable security: Design guidelines for security management systems. In SOUPS Workshop on Usable IT Security Management (USM), pages 1{4, Pittsburgh, PA, July 2007.
    • S. Chiasson, P. C. van Oorschot, and R. Biddle. Even experts deserve usable security: Design guidelines for security management systems. In SOUPS Workshop on Usable IT Security Management (USM), pages 1{4, Pittsburgh, PA, July 2007.
  • 6
    • 70350743533 scopus 로고    scopus 로고
    • L. F. Cranor. Designing a privacy preference specification interface: A case study. In Proceedings of the Workshop on Human-Computer Interaction and Security Systems, page 4 pages, 2003.
    • L. F. Cranor. Designing a privacy preference specification interface: A case study. In Proceedings of the Workshop on Human-Computer Interaction and Security Systems, page 4 pages, 2003.
  • 7
    • 84893108843 scopus 로고    scopus 로고
    • L. F. Cranor. A framework for reasoning about the human in the loop. In UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security, pages 1{15, Berkeley, CA, USA, 2008. USENIX Association.
    • L. F. Cranor. A framework for reasoning about the human in the loop. In UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security, pages 1{15, Berkeley, CA, USA, 2008. USENIX Association.
  • 9
    • 84900482702 scopus 로고    scopus 로고
    • Security in the wild: User strategies for managing security as an everyday, practical problem
    • 8(6):391{401
    • P. Dourish, R. E. Grinter, J. D. de la Flor, and M. Joseph. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6):391{401, 2004.
    • (2004) Personal and Ubiquitous Computing
    • Dourish, P.1    Grinter, R.E.2    de la Flor, J.D.3    Joseph, M.4
  • 11
    • 84883288662 scopus 로고    scopus 로고
    • W. Geng, S. Flinn, and J. DeDourek. Usable firewall configuration. In PST '05: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust, page 11 pages, 2005.
    • W. Geng, S. Flinn, and J. DeDourek. Usable firewall configuration. In PST '05: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust, page 11 pages, 2005.
  • 12
    • 36249015376 scopus 로고    scopus 로고
    • A. Herzog and N. Shahmehri. Usability and security of personal firewalls. New Approaches for Security, Privacy and Trust in Complex Environments, pages 37-48, 2007.
    • A. Herzog and N. Shahmehri. Usability and security of personal firewalls. New Approaches for Security, Privacy and Trust in Complex Environments, pages 37-48, 2007.
  • 13
    • 77953077196 scopus 로고    scopus 로고
    • A. Herzog and N. Shahmehri. User help techniques for usable security. In CHIMIT '07: Proceedings of the 2007 symposium on Computer Human Interaction for the Management of Information Technology, pages 93{102, Cambridge, Massachusetts, 2007. ACM.
    • A. Herzog and N. Shahmehri. User help techniques for usable security. In CHIMIT '07: Proceedings of the 2007 symposium on Computer Human Interaction for the Management of Information Technology, pages 93{102, Cambridge, Massachusetts, 2007. ACM.
  • 14
    • 33750091040 scopus 로고    scopus 로고
    • Bringing the user back into control: A new paradigm for usability in highly dynamic systems
    • S. Hohn. Bringing the user back into control: A new paradigm for usability in highly dynamic systems. Lecture notes in computer science, pages 114-122, 2006.
    • (2006) Lecture notes in computer science , pp. 114-122
    • Hohn, S.1
  • 18
    • 0004057785 scopus 로고    scopus 로고
    • International Encyclopedia of Ergonomics and Human Factors
    • Second Edition, CRC Press, Inc, Boca Raton, FL, USA
    • W. Karwowski. International Encyclopedia of Ergonomics and Human Factors, Second Edition - 3 Volume Set. CRC Press, Inc., Boca Raton, FL, USA, 2006.
    • (2006) 3 Volume Set
    • Karwowski, W.1
  • 22
    • 70350714851 scopus 로고    scopus 로고
    • Microsoft. Windows Vista Help: Choosing a network location
    • Microsoft. Windows Vista Help: Choosing a network location.
  • 23
    • 70350741798 scopus 로고    scopus 로고
    • Microsoft. Windows Vista Help: What is a firewall
    • Microsoft. Windows Vista Help: What is a firewall.
  • 26
    • 56449119921 scopus 로고    scopus 로고
    • R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1473{1482, New York, NY, USA, 2008. ACM.
    • R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1473{1482, New York, NY, USA, 2008. ACM.
  • 27
    • 34250879822 scopus 로고    scopus 로고
    • J. Rode, C. Johansson, P. DiGioia, R. S. Filho, K. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. Redmiles. Seeing further: extending visualization as a basis for usable security. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, pages 145{155, New York, NY, USA, 2006. ACM.
    • J. Rode, C. Johansson, P. DiGioia, R. S. Filho, K. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. Redmiles. Seeing further: extending visualization as a basis for usable security. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, pages 145{155, New York, NY, USA, 2006. ACM.
  • 28
    • 3042740017 scopus 로고    scopus 로고
    • Humans in the loop: Human-computer interaction and security
    • 1(3):75{79, May-June
    • S. Smith. Humans in the loop: human-computer interaction and security. Security & Privacy, IEEE, 1(3):75{79, May-June 2003.
    • (2003) Security & Privacy, IEEE
    • Smith, S.1
  • 29
    • 70350731536 scopus 로고    scopus 로고
    • J. Stoll, C. S. Tashman, W. K. Edwards, and K. Spafford. Sesame: informing user security decisions with system visualization. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1045{1054, New York, NY, USA, 2008. ACM.
    • J. Stoll, C. S. Tashman, W. K. Edwards, and K. Spafford. Sesame: informing user security decisions with system visualization. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1045{1054, New York, NY, USA, 2008. ACM.
  • 30
    • 70350706400 scopus 로고    scopus 로고
    • M. Tungare and M. Pérez-Quinones. Thinking outside the (beige) box: Personal information management beyond the desktop. In Proceedings of the 3rd Invitational Workshop on Personal Information Management, page 8 pages, 2008.
    • M. Tungare and M. Pérez-Quinones. Thinking outside the (beige) box: Personal information management beyond the desktop. In Proceedings of the 3rd Invitational Workshop on Personal Information Management, page 8 pages, 2008.
  • 31
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • A. Whitten and J. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In The 9th USENIX Security Symposium, pages 169-183, 1999.
    • (1999) The 9th USENIX Security Symposium , pp. 169-183
    • Whitten, A.1    Tygar, J.2
  • 32
    • 70350722192 scopus 로고    scopus 로고
    • A. Whitten and J. Tygar. Safe staging for computer security. In the Workshop on Human-Computer Interaction and security Systems, page 4 pages, Ft. Lauderdale, FL, 2003.
    • A. Whitten and J. Tygar. Safe staging for computer security. In the Workshop on Human-Computer Interaction and security Systems, page 4 pages, Ft. Lauderdale, FL, 2003.
  • 33
    • 3042539179 scopus 로고    scopus 로고
    • The use and usability of direction based filtering in firewalls
    • A. Wool. The use and usability of direction based filtering in firewalls. Computers and Security, 37:459-468, 2004.
    • (2004) Computers and Security , vol.37 , pp. 459-468
    • Wool, A.1
  • 35
    • 12844271558 scopus 로고    scopus 로고
    • Aligning security and usability
    • Sept.-Oct
    • K.-P. Yee. Aligning security and usability. Security & Privacy, IEEE, 2(5):48-55, Sept.-Oct. 2004.
    • (2004) Security & Privacy, IEEE , vol.2 , Issue.5 , pp. 48-55
    • Yee, K.-P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.