Proceedings of the 2005 Symposium on Usable Privacy and Security - SOUPS '05 2005
DOI: 10.1145/1073001.1073007
|View full text |Cite
|
Sign up to set email alerts
|

Making PRIME usable

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 40 publications
(29 citation statements)
references
References 7 publications
0
29
0
Order By: Relevance
“…More recent work has taken a holistic and more nuanced approach encompassing architectural and cognitive constraints as well as the user interface. For example, work on identity management and plausible deniability demands that the whole system architecture and user interface be designed with those end-user concerns in mind [231]. Finally, the reader will note that the literature relating to interaction techniques for privacy is intertwined with that of usable security.…”
Section: Prototyping Building and Deploying Privacy-sensitive Applimentioning
confidence: 99%
See 3 more Smart Citations
“…More recent work has taken a holistic and more nuanced approach encompassing architectural and cognitive constraints as well as the user interface. For example, work on identity management and plausible deniability demands that the whole system architecture and user interface be designed with those end-user concerns in mind [231]. Finally, the reader will note that the literature relating to interaction techniques for privacy is intertwined with that of usable security.…”
Section: Prototyping Building and Deploying Privacy-sensitive Applimentioning
confidence: 99%
“…One refinement of this idea is to let end-users defer making privacy choices until they are more familiar with the system, similar to the notion of safe staging introduced by Whitten and Tygar [308]. A refinement of this concept are Just-In-Time Click-Through Agreements (JITCTA) adopted by the EU PISA project [230], and later by the EU PRIME "PRivacy and Identity Management for Europe" project [231]. JITCTA are presented to the user at a time when he or she can take an informed decision on her privacy preferences.…”
Section: Helping End-users Specify Their Privacy Preferencesmentioning
confidence: 99%
See 2 more Smart Citations
“…User-controlled identity management: Although some approaches and prototypes of type 3 IMS exist, the major critique from the usability experts warns about exposing the user to high degrees of complexity, while users seek to get things done with the least possible effort (Dhamija et al 2008). Such complexity might confuse even users without disabilities, as (Pettersson et al 2005) found that users of various interfaces to privacy management get confused between pseudonyms and the real world even on user-friendlier interfaces.…”
Section: Open Issuesmentioning
confidence: 99%