Repository logo
 

Intentionality and Agency in Security

Accepted version
Peer-reviewed

Loading...
Thumbnail Image

Type

Conference Object

Change log

Authors

Krol, K 
Llewellyn-Jones, D 
Aebischer, S 
Dettoni, C 

Abstract

Weiser [13] said that the best software is that which just blends in and disap- pears. Security software has been at odds with this principle as it attempts to attract user attention whenever possible—it has been largely designed to be visible to the user and ask them to take action. For example, anti-virus software proudly notifies the user how many viruses it has stopped while websites dis- play padlocks and security seals. Users are disrupted in their work by security notifications, asked to read warnings and decide whether they want to heed or ignore them.

Description

Keywords

46 Information and Computing Sciences, 4608 Human-Centred Computing, 4604 Cybersecurity and Privacy

Journal Title

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Conference Name

Security Protocols Workshop 2018

Journal ISSN

0302-9743
1611-3349

Volume Title

11286 LNCS

Publisher

Springer International Publishing
Sponsorship
European Research Council (307224)
ERC 307224