Bringing design to the privacy table: Broadening “design” in “privacy by design” through the lens of HCI
RY Wong, DK Mulligan - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
In calls for privacy by design (PBD), regulators and privacy scholars have investigated the
richness of the concept of" privacy." In contrast," design" in HCI is comprised of rich and …
richness of the concept of" privacy." In contrast," design" in HCI is comprised of rich and …
[PDF][PDF] Take Your Security and Privacy Into Your Own Hands! Why Security and Privacy Assistants Should be Tangible.
In the era of ubiquitous computing, users security and privacy is at risk at almost all times.
Security and privacy assistants support their users in becoming aware of these risks and …
Security and privacy assistants support their users in becoming aware of these risks and …
Exploring the Use of Electromagnets to Influence Key Targeting on Physical Keyboards
L Mecke, I Prieto Romero… - Extended Abstracts of …, 2023 - dl.acm.org
In this work, we explore the use of force induced through electromagnets to influence finger
movement while using a keyboard. To achieve this we generate a magnetic field below a …
movement while using a keyboard. To achieve this we generate a magnetic field below a …
Values by design imaginaries: Exploring values work in ux practice
RYM Wong - 2020 - escholarship.org
Recognizing the prevalence of initiatives to align technology with social values through
design and" by design"(such as privacy by design, security by design, and governance by …
design and" by design"(such as privacy by design, security by design, and governance by …
Designing usable and secure authentication mechanisms for public spaces
A De Luca - 2011 - edoc.ub.uni-muenchen.de
Usable and secure authentication is a research field that approaches different challenges
related to authentication, including security, from a human-computer interaction perspective …
related to authentication, including security, from a human-computer interaction perspective …
Does moodyboard make internet use more secure? evaluating an ambient security visualization tool
Internet users are targets for ever-advancing phishing-and other attacks. The risks are, for
example, to disclose credit card information or passwords to unauthorized instances. One …
example, to disclose credit card information or passwords to unauthorized instances. One …
Take Your Security and Privacy Into Your Own Hands! Why Security and Privacy Assistants Should be Tangible
In the era of ubiquitous computing, users security and privacy is at risk at almost all times.
Security and privacy assistants support their users in becoming aware of these risks and …
Security and privacy assistants support their users in becoming aware of these risks and …
[引用][C] Bringing Design to the Privacy Table: Broadening" Design" in" Privacy by Design" Through
RY Wong, DK Mulligan - 2019