Panel: Humans and Technology for Inclusive Privacy and Security

by   Sanchari Das, et al.

Computer security and user privacy are critical issues and concerns in the digital era due to both increasing users and threats to their data. Separate issues arise between generic cybersecurity guidance (i.e., protect all user data from malicious threats) and the individualistic approach of privacy (i.e., specific to users and dependent on user needs and risk perceptions). Research has shown that several security- and privacy-focused vulnerabilities are technological (e.g., software bugs (Streiff, Kenny, Das, Leeth, Camp, 2018), insecure authentication (Das, Wang, Tingle, Camp, 2019)), or behavioral (e.g., sharing passwords (Das, Dingman, Camp, 2018); and compliance (Das, Dev, Srinivasan, 2018) (Dev, Das, Rashidi, Camp, 2019)). This panel proposal addresses a third category of sociotechnical vulnerabilities that can and sometimes do arise from non-inclusive design of security and privacy. In this panel, we will address users' needs and desires for privacy. The panel will engage in in-depth discussions about value-sensitive design while focusing on potentially vulnerable populations, such as older adults, teens, persons with disabilities, and others who are not typically emphasized in general security and privacy concerns. Human factors have a stake in and ability to facilitate improvements in these areas.



There are no comments yet.


page 1

page 2

page 3

page 4


SoK: A Framework for Unifying At-Risk User Research

At-risk users are people who experience elevated digital security, priva...

Common Privacy Weaknesses and Vulnerabilities in Software Applications

In this digital era, our privacy is under constant threat as our persona...

From Personal Data to Digital Legacy: Exploring Conflicts in the Sharing, Security and Privacy of Post-mortem Data

As digital technologies become more prevalent there is a growing awarene...

The privacy protection effectiveness of the video conference platforms' virtual background and the privacy concerns from the end-users

Due to the abrupt arise of pandemic worldwide, the video conferencing pl...

Usable, Acceptable, Appropriable: Towards Practicable Privacy

A majority of the work on digital privacy and security has focused on us...

Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations

Previous studies show that information security breaches and privacy vio...

Snitches Get Stitches: On The Difficulty of Whistleblowing

One of the most critical security protocol problems for humans is when y...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.