Mathis, F., Vaniea, K. and Khamis, M. (2022) Prototyping usable privacy and security systems: insights from experts. International Journal of Human–Computer Interaction, 38(5), pp. 468-490. (doi: 10.1080/10447318.2021.1949134)
![]() |
Text
244873.pdf - Published Version Available under License Creative Commons Attribution. 2MB |
Abstract
Iterative design, implementation, and evaluation of prototype systems is a common approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); however, research involving physical prototypes can be particularly challenging. We report on twelve interviews with established and nascent USEC researchers who prototype security and privacy-protecting systems and have published work in top-tier venues. Our interviewees range from professors to senior PhD candidates, and researchers from industry. We discussed their experiences conducting USEC research that involves prototyping, opinions on the challenges involved, and the ecological validity issues surrounding current evaluation approaches. We identify the challenges faced by researchers in this area such as the high costs of conducting field studies when evaluating hardware prototypes, the scarcity of open-source material, and the resistance to novel prototypes. We conclude with a discussion of how the USEC community currently supports researchers in overcoming these challenges and places to potentially improve support.
Item Type: | Articles |
---|---|
Status: | Published |
Refereed: | Yes |
Glasgow Author(s) Enlighten ID: | Mathis, Mr Florian and Khamis, Dr Mohamed |
Authors: | Mathis, F., Vaniea, K., and Khamis, M. |
College/School: | College of Science and Engineering > School of Computing Science |
Journal Name: | International Journal of Human–Computer Interaction |
Publisher: | Taylor and Francis |
ISSN: | 1044-7318 |
ISSN (Online): | 1532-7590 |
Published Online: | 05 August 2021 |
Copyright Holders: | Copyright © 2021 The Authors |
First Published: | First published in International Journal of Human–Computer Interaction 38(5): 468-490 |
Publisher Policy: | Reproduced under a Creative Commons License |
University Staff: Request a correction | Enlighten Editors: Update this record