National Academies Press: OpenBook
« Previous: Appendixes
Suggested Citation:"Appendix A: Workshop Agenda." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×

A
Workshop Agenda

USABILITY, SECURITY, PRIVACY OF COMPUTER SYSTEMS: A WORKSHOP


July 21–22, 2009

National Academy of Sciences, 2100 C St., N.W., Washington, DC


July 21, 2009

9:00 a.m.

Welcome

Nicholas Economides

 

• Introduction of Committee Members and Provocateurs

 

• Purpose and Goals of Workshop

 

• Review Workshop Agenda

 

• Logistical Items

9:30

Framing the Usability, Security, and Privacy Research Challenge

Butler Lampson

10:00

Perspectives on Current and Prospective Research

 

Security in Virtual Worlds

Frank L. Greitzer

Suggested Citation:"Appendix A: Workshop Agenda." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×

 

Usable Privacy

Lorrie Faith Cranor

 

Feeding Practice Back into Research

Mary Ellen Zurko

 

Cybersecurity and Insider Threat

Deanna D. Caputo

 

Creating a Hierarchy of Categories of User Interactions

Angela Sasse

 

Framework of Economic Issues on Usable Security

Nicholas Economides

12:15 p.m.

Working Lunch

1:30

Breakout Sessions I

 

How Do We Measure Usable Security?

Frank L. Greitzer and Charles P. Pfleeger, session leads

 

Approaches to Usable Security

Lorrie Faith Cranor and Don Norman, session leads

 

Developing a “Usable Security” Standard

Butler Lampson, session lead

 

Economic Issues for Usable Security and Policy Changes

Nicholas Economides and Susan Landau, session leads

 

Beyond Phishing 1: Improving Systems

James Foley and Simson Garfinkel, session leads

3:00

Break

3:30

Breakout Sessions II

 

Approaches to Usable Security

Lorrie Faith Cranor and Don Norman, session leads

 

Developing a “Usable Security” Standard

Butler Lampson, session lead

Suggested Citation:"Appendix A: Workshop Agenda." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×

 

Beyond Phishing 2: Alternatives to Passwords

Simson Garfinkel and Susan Landau, session leads

 

Human Factors and Security Incidents

Deanna D. Caputo and Charles Pfleeger, session leads

 

Usable Security Through the Stack, Its Life Cycle, and All Its Users

Angela Sasse and Mary Ellen Zurko, session leads

 

Report Back from Session Leads

July 22, 2009

 

9:00 a.m.

Welcoming Remarks

Nicholas Economides

9:30

Moving from Usability to Understandability

Don Norman, Co-Founder, Nielsen Norman Group

10:00

Breakout Sessions: Identifying Short- and Long-term Research Projects Related to Usability, Security, and Privacy of Computer Systems

11:30

Lunch

1:00 p.m.

Session Leads Report Back

2:00

Closing Remarks

Suggested Citation:"Appendix A: Workshop Agenda." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×
Page 43
Suggested Citation:"Appendix A: Workshop Agenda." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×
Page 44
Suggested Citation:"Appendix A: Workshop Agenda." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×
Page 45
Next: Appendix B: Workshop Participants »
Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop Get This Book
×
Buy Paperback | $29.00 Buy Ebook | $23.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or operate systems in ways that are inadvertently insecure. Moreover, security and privacy technologies originally were developed in a context in which system administrators had primary responsibility for security and privacy protections and in which the users tended to be sophisticated. Today, the user base is much wider--including the vast majority of employees in many organizations and a large fraction of households--but the basic models for security and privacy are essentially unchanged.

Security features can be clumsy and awkward to use and can present significant obstacles to getting work done. As a result, cybersecurity measures are all too often disabled or bypassed by the users they are intended to protect. Similarly, when security gets in the way of functionality, designers and administrators deemphasize it.

The result is that end users often engage in actions, knowingly or unknowingly, that compromise the security of computer systems or contribute to the unwanted release of personal or other confidential information. Toward Better Usability, Security, and Privacy of Information Technology discusses computer system security and privacy, their relationship to usability, and research at their intersection.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!