Abstract

ABSTRACT Iterative design, implementation, and evaluation of prototype systems is a common approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); however, research involving physical prototypes can be particularly challenging. We report on twelve interviews with established and nascent USEC researchers who prototype security and privacy-protecting systems and have published work in top-tier venues. Our interviewees range from professors to senior PhD candidates, and researchers from industry. We discussed their experiences conducting USEC research that involves prototyping, opinions on the challenges involved, and the ecological validity issues surrounding current evaluation approaches. We identify the challenges faced by researchers in this area such as the high costs of conducting field studies when evaluating hardware prototypes, the scarcity of open-source material, and the resistance to novel prototypes. We conclude with a discussion of how the USEC community currently supports researchers in overcoming these challenges and places to potentially improve support.

Highlights

  • Usable Privacy and Security (USEC) researchers have brought forth a plethora of novel usable privacy and security systems that extended state-of-the-art and facilitated new insights (e.g., (Hayashi et al, 2012; Krombholz et al, 2016; De Luca et al, 2014; De Luca, Von Zezschwitz, Nguyen et al, 2013)) – some of which found their way to wider adoption, such as PassPoints, Pass-Go and DAS which inspired Android’s lock patterns (Jermyn et al, 1999; Tao & Adams, 2008; Wiedenbeck et al, 2005)

  • We present 9 key challenges impeding artifact contribu­ tions in USEC, including challenges that have not seen indepth discussion in prior literature, e.g., the implementation challenges due to scarcity of open-source material; difficulties conducting ecologically valid studies, especially when evaluat­ ing hardware usable privacy and security solutions; and the lack of publication venues where novel evaluated USEC sys­ tems are encouraged

  • We aim to identify the set of challenges that are problematic to the subset of the USEC community that conducts prototyping-related research

Read more

Summary

Introduction

Prototyping is an integral part of human-centered research and design (Fallman, 2003; Ogunyemi et al, 2019; Wobbrock & Kientz, 2016). Wobbrock and Kientz (2016) argue that one of the main types of research contributions in Humancomputer Interaction (HCI) is artifact contributions: where researchers design inventive prototypes, such as new systems, tools and techniques that demonstrate novel forward-looking possibilities, or generate new insights through implementing and evaluating the prototypes (e.g., (Baudisch et al, 2006; Greenberg & Fitchett, 2001; Ishii & Ullmer, 1998; Lopes et al, 2017, 2018)). Prototyping is an integral part of human-centered research and design (Fallman, 2003; Ogunyemi et al, 2019; Wobbrock & Kientz, 2016). USEC researchers have argued for the importance of human-centered design since the 1970’s, when Saltzer and Schroeder (1975) outlined that security protection mechanisms require “psychological acceptability.”. This position was taken further by researchers from both the security and HCI communities (Adams & Sasse, 1999; Whitten & Tygar, 1999; Zurko & Simon, 1996). We aim to identify the set of challenges that are problematic to the subset of the USEC community that conducts prototyping-related research

Objectives
Methods
Results
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.