[1] L. Camp, "Mental models of privacy and security," Technology and Society Magazine, IEEE, vol. 28, no. 3, pp. 37-46, 2009.
Available: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=922735
This paper addresses computer security mental models: physical security, medical, criminal, warfare, and market.
This paper brought up unique issues in communicating computer security concepts. Despite minor spelling and grammar mistakes, this paper was very informative. The mental models are interesting and I feel that they needed to be examined in order to make computer security risks and standards more tangible and understandable.
[2] Tara Whalen , Kori M. Inkpen, Gathering evidence: use of visual security cues in web browsers, Proceedings of Graphics Interface 2005, May 09-11, 2005, Victoria, British Columbia
This paper is for a study that used eye tracking technology to see if users looked at browsers' security cues. The items observed include the https in the location bar/URL of the webpage, the lock or key icon in the browser, and certificate information.
This paper is from 2005. The researchers only had subjects look at Internet Explorer pages. There have been many advances made in the last couple of years in visual symbols. Also, Internet Explorer is slowly losing users to other browsers, especially Chrome and Firefox. It would be interesting to compare where users of different browsers look for security cues. This is still a good paper and members of my lab are interested in delving more into this subject.
Available: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=922735
This paper addresses computer security mental models: physical security, medical, criminal, warfare, and market.
This paper brought up unique issues in communicating computer security concepts. Despite minor spelling and grammar mistakes, this paper was very informative. The mental models are interesting and I feel that they needed to be examined in order to make computer security risks and standards more tangible and understandable.
[2] Tara Whalen , Kori M. Inkpen, Gathering evidence: use of visual security cues in web browsers, Proceedings of Graphics Interface 2005, May 09-11, 2005, Victoria, British Columbia
This paper is for a study that used eye tracking technology to see if users looked at browsers' security cues. The items observed include the https in the location bar/URL of the webpage, the lock or key icon in the browser, and certificate information.
This paper is from 2005. The researchers only had subjects look at Internet Explorer pages. There have been many advances made in the last couple of years in visual symbols. Also, Internet Explorer is slowly losing users to other browsers, especially Chrome and Firefox. It would be interesting to compare where users of different browsers look for security cues. This is still a good paper and members of my lab are interested in delving more into this subject.