Acknowledgments |
|
xi | |
|
|
xiii | |
|
|
1 | (12) |
|
1.1 Why Usable Privacy and Security Is Hard |
|
|
3 | (1) |
|
1.2 Why Usable Security Research Is Hard |
|
|
4 | (3) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (2) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
1.7 Related Surveys and Studies |
|
|
10 | (3) |
|
2 A Brief History of Usable Privacy and Security Research |
|
|
13 | (10) |
|
2.1 Early Work (1975--1995) |
|
|
13 | (1) |
|
2.2 The Birth of UPS (1995--2000) |
|
|
14 | (4) |
|
2.3 Creation of the UPS Research Community (2000--2005) |
|
|
18 | (1) |
|
|
19 | (1) |
|
2.5 Current UPS Publishing Venues |
|
|
20 | (3) |
|
3 Major Themes in UPS Academic Research |
|
|
23 | (64) |
|
|
23 | (28) |
|
|
24 | (13) |
|
|
37 | (3) |
|
3.1.3 Graphical Authentication |
|
|
40 | (3) |
|
|
43 | (3) |
|
3.1.5 Token-Based Authentication |
|
|
46 | (1) |
|
3.1.6 Mental Computation and One-Time Passwords |
|
|
47 | (1) |
|
|
48 | (2) |
|
3.1.8 Fallback and Backup Authentication |
|
|
50 | (1) |
|
3.2 Email Security and PKI |
|
|
51 | (4) |
|
3.2.1 Automatic, Transparent Encryption |
|
|
53 | (1) |
|
3.2.2 Future of Secure Messaging |
|
|
54 | (1) |
|
3.3 Anti-Phishing Efforts |
|
|
55 | (10) |
|
3.3.1 A Brief History of Phishing |
|
|
56 | (2) |
|
3.3.2 Passive Security Indicators |
|
|
58 | (4) |
|
3.3.3 Active Security Warnings |
|
|
62 | (1) |
|
|
63 | (2) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (4) |
|
3.6 Web Privacy and Fair Information Practice |
|
|
70 | (5) |
|
|
70 | (1) |
|
|
71 | (2) |
|
3.6.3 Behavioral Advertising |
|
|
73 | (1) |
|
|
74 | (1) |
|
3.7 Policy Specification and Interaction |
|
|
75 | (3) |
|
3.8 Mobile Security and Privacy |
|
|
78 | (3) |
|
|
78 | (1) |
|
3.8.2 Application platforms |
|
|
79 | (1) |
|
3.8.3 Mobile authentication |
|
|
80 | (1) |
|
|
81 | (3) |
|
3.10 Security Administrators |
|
|
84 | (3) |
|
|
87 | (6) |
|
|
87 | (1) |
|
4.2 Safe and Secure Defaults |
|
|
88 | (1) |
|
4.3 Provide Users with Better Information, not More Information |
|
|
88 | (1) |
|
4.4 Users Require Clear Context to Make Good Decisions |
|
|
89 | (1) |
|
4.5 Information Presentation is Critical |
|
|
90 | (1) |
|
4.6 Education Works, But Has Limits |
|
|
90 | (3) |
|
|
93 | (12) |
|
5.1 Subject Challenge: Authentication |
|
|
93 | (1) |
|
5.2 Subject Challenge: Adversary Modeling |
|
|
94 | (1) |
|
5.3 Subject Challenge: Administrators and System Administration |
|
|
95 | (1) |
|
5.4 Subject Challenge: Consumer Privacy |
|
|
96 | (1) |
|
5.5 Subject Challenge: Social Computing |
|
|
97 | (2) |
|
5.6 Domain Challenge: Ecological Validity |
|
|
99 | (1) |
|
5.7 Domain Challenge: Teaching |
|
|
100 | (5) |
|
6 Conclusion: The Next Ten Years |
|
|
105 | (4) |
Bibliography |
|
109 | (40) |
Authors' Biographies |
|
149 | |