Humans and technology for inclusive privacy and security

Sanchari Das, Robert S. Gutzwiller, Rod D. Roscoe, Prashanth Rajivan, Yang Wang, L. Jean Camp, Roberto Hoyle

Research output: Contribution to journalConference articlepeer-review

Abstract

Computer security and user privacy are critical issues and concerns in the digital era due to both increasing users and threats to their data. Separate issues arise between generic cybersecurity guidance (i.e., protect all user data from malicious threats) and the individualistic approach of privacy (i.e., specific to users and dependent on user needs and risk perceptions). Research has shown that several security- and privacy-focused vulnerabilities are technological (e.g., software bugs (Streiff, Kenny, Das, Leeth, & Camp, 2018), insecure authentication (Das, Wang, Tingle, & Camp, 2019)), or behavioral (e.g., sharing passwords (Das, Dingman, & Camp, 2018); and compliance (Das, Dev, & Srinivasan, 2018) (Dev, Das, Rashidi, & Camp, 2019)). This panel proposal addresses a third category of sociotechnical vulnerabilities that can and sometimes do arise from non-inclusive design of security and privacy. In this panel, we will address users’ needs and desires for privacy. The panel will engage in in-depth discussions about value-sensitive design while focusing on potentially vulnerable populations, such as older adults, teens, persons with disabilities, and others who are not typically emphasized in general security and privacy concerns. Human factors have a stake in and ability to facilitate improvements in these areas.

Original languageEnglish (US)
Pages (from-to)461-464
Number of pages4
JournalProceedings of the Human Factors and Ergonomics Society
Volume64
Issue number1
DOIs
StatePublished - 2020
Event64th International Annual Meeting of the Human Factors and Ergonomics Society, HFES 2020 - Virtual, Online
Duration: Oct 5 2020Oct 9 2020

ASJC Scopus subject areas

  • Human Factors and Ergonomics

Fingerprint

Dive into the research topics of 'Humans and technology for inclusive privacy and security'. Together they form a unique fingerprint.

Cite this