Sharing your assets: A holistic review of sharing economy
Even though academics and practitioners extensively apply the notion of the sharing
economy (SE), the conceptualization and the literature construction remained disjointed and …
economy (SE), the conceptualization and the literature construction remained disjointed and …
User experience research in the work context: Maps, gaps and agenda
User experience (UX) research has been criticized for focusing on leisure contexts and
overlooking the work contexts. Moreover, researchers have been drawing attention to how …
overlooking the work contexts. Moreover, researchers have been drawing attention to how …
Regroup: Interactive machine learning for on-demand group creation in social networks
We present ReGroup, a novel end-user interactive machine learning system for hel**
people create custom, on demand groups in online social networks. As a person adds …
people create custom, on demand groups in online social networks. As a person adds …
Guidelines for usable cybersecurity: Past and present
Usability is arguably one of the most significant social topics and issues within the field of
cybersecurity today. Supported by the need for confidentiality, integrity, availability and other …
cybersecurity today. Supported by the need for confidentiality, integrity, availability and other …
Designing for effective end-user interaction with machine learning
S Amershi - Proceedings of the 24th annual ACM symposium …, 2011 - dl.acm.org
End-user interactive machine learning is a promising tool for enhancing human capabilities
with large data. Recent work has shown that we can create end-user interactive machine …
with large data. Recent work has shown that we can create end-user interactive machine …
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users
over who can access their data; achieving finer-grained control generally requires more user …
over who can access their data; achieving finer-grained control generally requires more user …
[PDF][PDF] A new evaluation criteria for effective security awareness in computer risk management based on AHP
Any security system, no matter how well designed and implemented, will have to rely on
people. The fact that human factors play a crucial part in the majority of accidents is a …
people. The fact that human factors play a crucial part in the majority of accidents is a …
Pragmatic security: modelling it security management responsibilities for SME archetypes
S Parkin, A Fielder, A Ashby - Proceedings of the 8th ACM CCS …, 2016 - dl.acm.org
Here we model the indirect costs of deploying security controls in small-to-medium
enterprises (SMEs) to manage cyber threats. SMEs may not have the in-house skills and …
enterprises (SMEs) to manage cyber threats. SMEs may not have the in-house skills and …
A user study of policy creation in a flexible access-control system
Significant effort has been invested in develo** expressive and flexible access-control
languages and systems. However, little has been done to evaluate these systems in …
languages and systems. However, little has been done to evaluate these systems in …
More than skin deep: measuring effects of the underlying model on access-control system usability
In access-control systems, policy rules conflict when they prescribe different decisions (allow
or deny) for the same access. We present the results of a user study that demonstrates the …
or deny) for the same access. We present the results of a user study that demonstrates the …