Abstract: Scholars and professionals claim that users are the weakest link in the secure and trustworthy computing chain. Users find security protocols opaque and difficult to follow but at the same time have a deep and unmet desire for privacy and security. But what if not users, but designers, coders, managers, and system administrators are the weakest link? Indeed, the people who develop and administer systems often fail to understand the needs, practices, abilities, and desires of users, But understanding users is tough, especially in the security and privacy domain. In this talk I will discuss the key challenges in conducting user research that aims to make systems more secure, trustworthy, and privacy-enhancing. I will also suggest solutions, share existing resources on methods to understand users, and identify high impact areas for future work. Bio:
|
|
About the WATCH series: Transforming today's trusted but untrustworthy cyberinfrastructure into one that can meet society's growing demands requires both technical advances and improved understanding of how people and organizations of many backgrounds perceive, decide to adopt, and actually use technology; WATCH aims to provide thought-provoking talks by innovative thinkers with ideas that illuminate these challenges and provide signposts toward solutions; The series is jointly organized by NSF's Computer Science and Engineering (CISE) and Social, Behavioral, and Economic (SBE) Directorates and sponsored by the CISE Secure and Trustworthy Cyberspace (SaTC) Program; Talks will be recorded and made available over the Internet; |