TY - GEN
T1 - The third wave? Inclusive privacy and security
AU - Wang, Yang
N1 - Funding Information:
I would like to thank the anonymous reviewers, the shepherds Anil Somayaji and Olgierd Pieczul, as well as the NSPW attendees for their thoughtful feedback on this manuscript. I am also grateful to many colleagues such as Kevin Crowston, Jason Dedrick, Apu Kapadia, Yun Huang, Alfred Kobsa, Dan Cosley, Mike Just, Larry Koved, Karyn Moffatt, Lynne Coventry, Jeffrey Bigham, Amy Hurst, Aaron Steinfeld, Lorrie Cranor, Jason Hong, Blase Ur, Norman Su, Jordan Hayes, Nat? Barbosa, Huichuan Xia, Yaxing Yao, Xiao Li, Bryan Dosono and Anuj Shah for discussions that helped shape my ideas on this topic. This work was supported in part by the National Institute on Disability, Independent Living, and Rehabilitation Research (NIDILRR Grant 90DP0061-01-00) and the National Science Foundation (NSF Grant CNS-1652497).
Funding Information:
I would like to thank the anonymous reviewers, the shepherds Anil Somayaji and Olgierd Pieczul, as well as the NSPW attendees for their thoughtful feedback on this manuscript. I am also grateful to many colleagues such as Kevin Crowston, Jason Dedrick, Apu Kapadia, Yun Huang, Alfred Kobsa, Dan Cosley, Mike Just, Larry Koved, Karyn Moffatt, Lynne Coventry, Jeffrey Bigham, Amy Hurst, Aaron Steinfeld, Lorrie Cranor, Jason Hong, Blase Ur, Norman Su, Jordan Hayes, Natã Barbosa, Huichuan Xia, Yaxing Yao, Xiao Li, Bryan Dosono and Anuj Shah for discussions that helped shape my ideas on this topic. This work was supported in part by the National Institute on Disability, Independent Living, and Rehabilitation Research (NIDILRR Grant 90DP0061-01-00) and the National Science Foundation (NSF Grant CNS-1652497).
Publisher Copyright:
© 2017 Copyright held by the owner/author(s).
PY - 2017/10/1
Y1 - 2017/10/1
N2 - The field of security and privacy has made steady progresses in developing technical mechanisms, which I refer to as the first wave of security and privacy research. Since the 70's, human factors and usability have been recognized as a key property of effective security and privacy mechanisms. This is what I call the second wave of security and privacy research, focusing on usability. In this article, I propose and advocate for a third wave of research that I call inclusive security and privacy, which is concerned with designing security and privacy mechanisms that are inclusive to people with various characteristics, abilities, needs and values. I present a preliminary research framework and research agenda for advancing inclusive security and privacy.
AB - The field of security and privacy has made steady progresses in developing technical mechanisms, which I refer to as the first wave of security and privacy research. Since the 70's, human factors and usability have been recognized as a key property of effective security and privacy mechanisms. This is what I call the second wave of security and privacy research, focusing on usability. In this article, I propose and advocate for a third wave of research that I call inclusive security and privacy, which is concerned with designing security and privacy mechanisms that are inclusive to people with various characteristics, abilities, needs and values. I present a preliminary research framework and research agenda for advancing inclusive security and privacy.
KW - Accessibility
KW - Privacy
KW - Security
KW - Universal design
UR - http://www.scopus.com/inward/record.url?scp=85044652769&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85044652769&partnerID=8YFLogxK
U2 - 10.1145/3171533.3171538
DO - 10.1145/3171533.3171538
M3 - Conference contribution
AN - SCOPUS:85044652769
T3 - ACM International Conference Proceeding Series
SP - 122
EP - 130
BT - New Security Paradigms Workshop, NSPW 2017 - Proceedings
PB - Association for Computing Machinery
T2 - 26th Annual New Security Paradigms Workshop, NSPW 2017
Y2 - 1 October 2017 through 4 October 2017
ER -