Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing, pp. 391-401, 2004.
Access Control Ubiquitous Computing Security Management Email Message Security Technology
Ubiquitous and mobile technologies create new challenges for system security. Effective security solutions depend not only on the mathematical and technical properties of those solutions, but also on people’s ability to understand them and use them as part of their work. As a step towards solving this problem, we have been examining how p...More
Full Text (Upload PDF)