Supporting mental model accuracy in trigger-action programming

J Huang, M Cakmak - Proceedings of the 2015 acm international joint …, 2015 - dl.acm.org
Trigger-action programming is a simple programming model that enables users to create
rules that automate behavior of smart homes, devices, and online services. Existing trigger …

Using personal examples to improve risk communication for security & privacy decisions

M Harbach, M Hettig, S Weber, M Smith - Proceedings of the SIGCHI …, 2014 - dl.acm.org
IT security systems often attempt to support users in taking a decision by communicating
associated risks. However, a lack of efficacy as well as problems with habituation in such …

[图书][B] Keeping found things found: The study and practice of personal information management

W Jones - 2010 - books.google.com
Keeping Found Things Found: The Study and Practice of Personal Information Management
is the first comprehensive book on new'favorite child'of R&D at Microsoft and elsewhere …

Privacy-aware role-based access control

Q Ni, E Bertino, J Lobo, C Brodie, CM Karat… - ACM Transactions on …, 2010 - dl.acm.org
In this article, we introduce a comprehensive framework supporting a privacy-aware access
control mechanism, that is, a mechanism tailored to enforce access control to data …

Bringing design to the privacy table: Broadening “design” in “privacy by design” through the lens of HCI

RY Wong, DK Mulligan - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
In calls for privacy by design (PBD), regulators and privacy scholars have investigated the
richness of the concept of" privacy." In contrast," design" in HCI is comprised of rich and …

End-user privacy in human–computer interaction

G Iachello, J Hong - Foundations and Trends® in Human …, 2007 - nowpublishers.com
The purpose of this article is twofold. First, we summarize research on the topic of privacy in
Human–Computer Interaction (HCI), outlining current approaches, results, and trends …

Automated extraction of security policies from natural-language software documents

X Xiao, A Paradkar, S Thummalapenta… - Proceedings of the ACM …, 2012 - dl.acm.org
Access Control Policies (ACP) specify which principals such as users have access to which
resources. Ensuring the correctness and consistency of ACPs is crucial to prevent security …

An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench

CA Brodie, CM Karat, J Karat - … of the second symposium on Usable …, 2006 - dl.acm.org
Today organizations do not have good ways of linking their written privacy policies with the
implementation of those policies. To assist organizations in addressing this issue, our …

Repacking 'privacy'for a networked world

A Crabtree, P Tolmie, W Knight - Computer Supported Cooperative Work …, 2017 - Springer
In this paper we examine the notion of privacy as promoted in the digital economy and how it
has been taken up as a design challenge in the fields of CSCW, HCI and Ubiquitous …

HCI and societal issues: A framework for engagement

H Hochheiser, J Lazar - International Journal of Human [# x02013] …, 2007 - Taylor & Francis
Human-computer interaction (HCI) is much broader than the study of interface design and
input devices. It includes considerations of the social, political, ethical, and societal …