National Academies Press: OpenBook
« Previous: Appendix A: Workshop Agenda
Suggested Citation:"Appendix B: Workshop Participants." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×

B
Workshop Participants

Alessandro Acquisti, Carnegie Mellon University

Gail-Joon Ahn, Arizona State University

Lujo Bauer, Carnegie Mellon University

Amy Baylor, National Science Foundation

Richard Beckwith, Intel Corporation

Richard Beigel, National Science Foundation

Genevieve Bell, Intel Corporation

Steven Bellovin, Columbia University

Konstantin Beznosov, University of British Columbia

Sameer Bhalotra, Senate Select Committee on Intelligence

Duane Blackburn, Office of Science and Technology Policy, Executive Office of the President, The White House

Bob Blakley, The Burton Group

Matt Blaze, University of Pennsylvania

Robert Bohn, National Coordination Office for Networking and Information Research and Development

Roy Boivin II, IT Masterminds

Tanya Brewer, National Institute of Standards and Technology

Desiree Campbell, Cigital Federal

Deanna Caputo, Mitre Corporation

Bill Cheswick, AT&T

Yee Yin Choong, National Institute of Standards and Technology

Douglas E. Comer, Purdue University

Greg Conti, Rumint

Suggested Citation:"Appendix B: Workshop Participants." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×

Alissa Cooper, Center for Democracy and Technology

Earl Crane, Department of Homeland Security

Lorrie Faith Cranor, Carnegie Mellon University

Renee Crews, Department of Justice

Anita D’Amico, Applied Visions

Patrick Dempster, CSC

Rachna Dhamija, Harvard University

Roger Dingledine, TOR Project

Donna Dodson, National Institute of Standards and Technology

Cathy Dunaway, Department of Education

Stephen Duncan, General Services Administration

Nicholas Economides, New York University

Keith Edwards, Georgia Institute of Technology

Sherri Eillis, Department of Transportation

Carl Ellison, Microsoft Corporation

Jeremy Epstein, SRI International

Nicholas Feamster, Georgia Institute of Technology

James Fisher, Noblis

Heather Foley, Peace Corps

James Foley, Georgia Institute of Technology

Myisha Frazier-McElveen, CitiGroup

Jeffrey Friedberg, Microsoft Corporation

Simson Garfinkel, Naval Postgraduate School

Carrie Gates, Computer Associates International, Inc.

Nathaniel Good, Palo Alto Research Center

Chris Greer, National Coordination Office for Networking and Information Research and Development

Frank Greitzer, Pacific Northwest National Laboratory

Wendy Grossman, Independent Consultant

Lawrence Hale, General Services Administration

Gillian Hayes, University of California, Irvine

Marty Herman, National Institute of Standards and Technology

Haym Hirsh, National Science Foundation

Jason Hong, Carnegie Mellon University

Darren Kall, Kall Consulting

Jason Kerben, Department of State

Joseph Kielman, Department of Homeland Security

Larry Koved, IBM

Mike Lake, IBM

Butler Lampson, Microsoft Corporation

Susan Landau, Privacylink.org

Carl Landwehr, Office of the Director of National Intelligence

Ji Sun Lee, Department of Homeland Security

Suggested Citation:"Appendix B: Workshop Participants." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×

Richard Lempert, Department of Homeland Security

Bill Lewis, United States Navy

Susan Lightman, Executive Office of the President

Patrick Lincoln, SRI International

Roy Maxion, Carnegie Mellon University

Ernest McDuffie, National Coordination Office for Networking and Information Research and Development

Gary McGraw, Cigital Federal

Ross Micheals, National Institute of Standards and Technology

Richard Morris, National Institutes of Health

Pat Muoio, Office of the Director of National Intelligence/Science and Technology

Elaine Newton, National Institute of Standards and Technology

Brand Niemann, Environmental Protection Agency

Donald Norman, Nielsen Norman Group

Lucy Nowell, Department of Energy

Jennifer O’Connor, Department of Homeland Security

Andrew Patrick, Carleton University

Hetel Petel, Peace Corps

Charles Pfleeger, Pfleeger Consulting

Shari Lawrence Pfleeger, Rand Corporation

Gary Phillips, Symantec

Walt Polansky, Department of Energy

Jules Polonestky, Future of Privacy Forum

Rob Reeder, Microsoft Corporation

Holly Rensvold, Department of Homeland Security

Tom Rhodes, National Institute of Standards and Technology

Marc Rogers, Purdue University

Charles Romine, National Institute of Standards and Technology

Marc Rotenberg, Electronic Privacy Information Center

Norman Sadeh, Carnegie Mellon University

Angela Sasse, University College London

Stuart Schechter, Microsoft Corporation

Diane Smetters, Palo Alto Research Center

Darren Smith, National Oceanic and Atmospheric Administration

Jim Sorace, Department of Health and Human Services

Sylvia Spengler, National Science Foundation

Brian Stanton, National Institute of Standards and Technology

Tim Stanton, Naval Postgraduate School

Joe Steele, Adobe Systems

Brock Stevenson, Department of Justice

Michael Sulak, Department of State

Denise Tayloe, Privo

Suggested Citation:"Appendix B: Workshop Participants." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×

Mary Theofanos, National Institute of Standards and Technology

Joseph Trella, Truestone

V.N. Venkatakrishnan, University of Illinois at Chicago

Daniel Weitzner, Massachusetts Institute of Technology

Geoff Willcher, Bellevue College

Jeannette Wing, National Science Foundation

Irene Wu, Federal Communications Commission

Lenore Zuck, National Science Foundation

Mary Ellen Zurko, IBM

Suggested Citation:"Appendix B: Workshop Participants." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×
Page 46
Suggested Citation:"Appendix B: Workshop Participants." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×
Page 47
Suggested Citation:"Appendix B: Workshop Participants." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×
Page 48
Suggested Citation:"Appendix B: Workshop Participants." National Research Council. 2010. Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/12998.
×
Page 49
Next: Appendix C: Biosketches of Steering Committee Members and Staff »
Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop Get This Book
×
Buy Paperback | $29.00 Buy Ebook | $23.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or operate systems in ways that are inadvertently insecure. Moreover, security and privacy technologies originally were developed in a context in which system administrators had primary responsibility for security and privacy protections and in which the users tended to be sophisticated. Today, the user base is much wider--including the vast majority of employees in many organizations and a large fraction of households--but the basic models for security and privacy are essentially unchanged.

Security features can be clumsy and awkward to use and can present significant obstacles to getting work done. As a result, cybersecurity measures are all too often disabled or bypassed by the users they are intended to protect. Similarly, when security gets in the way of functionality, designers and administrators deemphasize it.

The result is that end users often engage in actions, knowingly or unknowingly, that compromise the security of computer systems or contribute to the unwanted release of personal or other confidential information. Toward Better Usability, Security, and Privacy of Information Technology discusses computer system security and privacy, their relationship to usability, and research at their intersection.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!