- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Fri, 12 Jan 2007 12:19:12 -0500
- To: public-wsc-wg@w3.org
- Cc: maritzaj@gmail.com
- Message-ID: <OF2A684072.1D022D19-ON85257261.005EEB23-85257261.005F2440@LocalDomain>
Maritza has committed to attending should our position paper be accepted, and she and I are working on it. The deadline is 5pm today, Pacific time. If you have any comments, be sure to send them to both Maritza and myself, as she's the one who will submit it. http://www.w3.org/2006/WSC/wiki/WorkshopPositionPaper Mez Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389) Lotus/WPLC Security Strategy and Patent Innovation Architect "Mary Ellen Zurko" <Mary_Ellen_Zurko@notesdev.ibm.com> Sent by: public-wsc-wg-request@w3.org 01/04/2007 11:06 AM To public-wsc-wg@w3.org cc Subject Fw: fyi Fw: CHI 2007 Workshop CFP: Security User Studies And on top of all those challenges, how do we integrate security user studies into the standards process? I'd very much like to see a position paper and at least one attendee from this WG, with an emphasis on the special considerations of integrating security user studies into standards processes. Is anyone already pursuing this, or willing to? The deadline is tight, and right on top of our deadline for draft input on our Note for the editor (Tyler), but this is an important topic for the success of our recommendations. Mez Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389) Lotus/WPLC Security Strategy and Patent Innovation Architect Erika Shehan <erika@CC.GATECH.EDU> Sent by: "ACM SIGCHI General Interest Announcements (Mailing List)" <CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG> 01/02/2007 12:00 PM Please respond to Erika Shehan <erika@CC.GATECH.EDU> To CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG cc Subject CHI 2007 Workshop CFP: Security User Studies ** Security User Studies: Methodologies and Best Practices ** Workshop at CHI 2007 http://www.verbicidal.org/hcisec-workshop/ Position Paper Deadline: January 12th, 2007, 5:00PM PDT Notification: February 1st, 2007 Workshop Date: April 28th, 2007 Location: San Jose, CA, USA PURPOSE: As networked computing weaves itself into many aspects of daily life, ensuring the security of networked systems is becoming vitally important. Interest in usable security -- the research, development, and study of systems that are both usable and secure -- has been growing both in the human-computer interaction and information security communities in the past several years. Despite this growing interest, however, the process of conducting effective, ethical security-related user studies remains daunting. Users deal with security infrequently and irregularly, and most do not notice or care about security until it is missing or broken. Security is rarely a primary goal or task of users, making many traditional HCI evaluation techniques difficult or even impossible to use. This workshop, held in conjunction with the ACM CHI2007 (http://www.chi2007.org/) conference, will bring together researchers and practitioners from the HCI and information security communities to explore methodological challenges and best practices for conducting security-related user studies, including: *Study Design: How can evaluators design studies that are faithful to the fact that in the real world, security is almost never a primary goal? How can evaluators motivate study participants to complete security-related tasks without overemphasizing security? How should evaluators even decide what to test in a security user study? How can researchers handle the problem that users may claim to take particular steps to protect their security, but in reality do something else? *Ethical Issues: How can evaluators conduct realistic studies involving attacks on users, yet at the same time protect study participants from harm or embarrassment? When is it appropriate to launch security attacks or employ deception in studies? *Lessons Learned & Best Practices: Why have previous security user studies succeeded or failed? What are best practices for security user studies? What would security user study processes, checklists, and criteria look like? PARTICIPATING: People interested in joining the workshop should submit a position paper of up to four pages along with a cover letter describing their research interests and background in this area to Erika Shehan (erika@cc.gatech.edu) by January 12, 2007. We encourage submissions from practitioners as well as researchers interested and involved in all forms of empirical usable security research. Position papers may describe prior empirical work in usable security (including successes or difficulties encountered), discussions of specific problems associated with security-related user studies, and proposals for possible user studies (both realistic and outlandish). Position papers will be reviewed for relevance, overall quality, and potential to generate discussion. To facilitate interaction, the workshop will be limited to twenty participants. Prior experience with security user studies is recommended, but submissions from enthusiastic newcomers to usable security will be warmly welcomed. Please note that at least one of the authors of an accepted paper needs to register for the workshop and one day of the CHI 2007 conference. ORGANIZERS: Serge Egelman, Carnegie Mellon University Jen King, Yahoo! Inc Robert C. Miller, MIT CS & AI Laboratory Nick Ragouzis, Enosis LLC Erika Shehan, Georgia Tech --------------------------------------------------------------- To unsubscribe, send an empty email to mailto:chi-announcements-unsubscribe-request@listserv.acm.org For further details of CHI lists see http://sigchi.org/listserv ---------------------------------------------------------------
Received on Friday, 12 January 2007 17:19:25 UTC