Intentionality and Agency in Security
Accepted version
Peer-reviewed
Repository URI
Repository DOI
Change log
Authors
Krol, K
Llewellyn-Jones, D
Aebischer, S
Dettoni, C
Stajano, Francesco https://orcid.org/0000-0001-9186-6798
Abstract
Weiser [13] said that the best software is that which just blends in and disap- pears. Security software has been at odds with this principle as it attempts to attract user attention whenever possible—it has been largely designed to be visible to the user and ask them to take action. For example, anti-virus software proudly notifies the user how many viruses it has stopped while websites dis- play padlocks and security seals. Users are disrupted in their work by security notifications, asked to read warnings and decide whether they want to heed or ignore them.
Description
Keywords
46 Information and Computing Sciences, 4608 Human-Centred Computing, 4604 Cybersecurity and Privacy
Journal Title
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Conference Name
Security Protocols Workshop 2018
Journal ISSN
0302-9743
1611-3349
1611-3349
Volume Title
11286 LNCS
Publisher
Springer International Publishing
Publisher DOI
Sponsorship
European Research Council (307224)
ERC 307224