[1]
Unpacking Security Policy Compliance: The Motivators and Barriers of
Employees' Security Behaviors
Design and Compliance
/
Blythe, John M.
/
Coventry, Lynne
/
Little, Linda
Proceedings of the 2015 Symposium on Usable Privacy and Security
2015-07-22
p.103-122
© Copyright 2015 Authors
Summary: The body of research that focuses on employees' Information Security Policy
compliance is problematic as it treats compliance as a single behavior. This
study explored the underlying behavioral context of information security in the
workplace, exploring how individual and organizational factors influence the
interplay of the motivations and barriers of security behaviors. Investigating
factors that had previously been explored in security research, 20 employees
from two organizations were interviewed and the data was analyzed using
framework analysis. The analysis indicated that there were seven themes
pertinent to information security: Response Evaluation, Threat Evaluation,
Knowledge, Experience, Security Responsibility, Personal and Work Boundaries,
and Security Behavior. The findings suggest that these differ by security
behavior and by the nature of the behavior (e.g. on- and offline). Conclusions
are discussed highlighting barriers to security actions and implications for
future research and workplace practice.
[2]
EDITED BOOK
Handbook of Human Centric Visualization
/
Huang, Weidong
2014
n.29
p.743
Springer New York
DOI: 10.1007/978-1-4614-7485-2
== Part I: Visual Communication ==
Visualizing Thought (3-40)
+ Tversky, Barbara
Gryphon: A 'Little' Domain-Specific Programming Language for Diffusion MRI Visualizations (41-61)
+ Chen, Jian
+ Cai, Haipeng
+ Auchus, Alexander P.
+ Laidlaw, David H.
Viewing Abstract Data as Maps (63-89)
+ Gansner, Emden R.
+ Hu, Yifan
+ Kobourov, Stephen G.
== Part II: Theory and Science ==
Individual Differences and Translational Science in the Design of Human-Centered Visualizations (93-113)
+ Green, Tera Marie
+ Arias-Hernandez, Richard
+ Fisher, Brian
Evaluating Visualization Environments: Cognitive, Social, and Cultural Perspectives (115-145)
+ Hundhausen, Christopher D.
On the Prospects for a Science of Visualization (147-175)
+ Rensink, Ronald A.
== Part III: Principles, Guidelines and Recommendations ==
Toward a Better Understanding and Application of the Principles of Visual Communication (179-201)
+ Bae, Juhee
+ Watson, Benjamin
Pep Up Your Time Machine: Recommendations for the Design of Information Visualizations of Time-Dependent Data (203-225)
+ Kriglstein, Simone
+ Pohl, Margit
+ Smuc, Michael
Using Textbook Illustrations to Extract Design Principles for Algorithm Visualizations (227-249)
+ Velázquez-Iturbide, J. Ángel
== Part IV: Methods ==
Conceptual Design for Sensemaking (253-283)
+ Blandford, Ann
+ Faisal, Sarah
+ Attfield, Simon
An Introduction and Guide to Evaluation of Visualization Techniques Through User Studies (285-313)
+ Forsell, Camilla
+ Cooper, Matthew
User-Centered Evaluation of Information Visualization Techniques: Making the HCI-InfoVis Connection Explicit (315-336)
+ Freitas, Carla M. D. S.
+ Pimenta, Marcelo S.
+ Scapin, Dominique L.
Eye Tracking on Visualizations: Progressive Extraction of Scanning Strategies (337-372)
+ Goldberg, Joseph H.
+ Helfman, Jonathan I.
Evaluating Overall Quality of Graph Visualizations Indirectly and Directly (373-390)
+ Huang, Weidong
Visual Analysis of Eye Tracking Data (391-409)
+ Raschke, Michael
+ Blascheck, Tanja
+ Burch, Michael
User Studies in Visualization: A Reflection on Methods (411-426)
+ Tory, Melanie
== Part V: Perception and Cognition ==
On the Benefits and Drawbacks of Radial Diagrams (429-451)
+ Burch, Michael
+ Weiskopf, Daniel
Measuring Memories for Objects and Their Locations in Immersive Virtual Environments: The Subjective Component of Memorial Experience (453-471)
+ Coxon, Matthew
+ Mania, Katerina
Human-Centric Chronographics: Making Historical Time Memorable (473-511)
+ Korallo, Liliya
+ Davis, Stephen Boyd
+ Foreman, Nigel
+ Moar, Magnus
Visualizing Multiple Levels and Dimensions of Social Network Properties (513-525)
+ McGrath, Cathleen
+ Blythe, Jim
+ Krackhardt, David
== Part VI: Dynamic Visualization ==
Adaptive Diagrams: A Research Agenda to Explore How Learners Can Manipulate Online Diagrams to Self-Manage Cognitive Load (529-550)
+ Agostinho, Shirley
+ Tindall-Ford, Sharon
+ Bokosmaty, Sahar
Dynamic Visualisations and Motor Skills (551-580)
+ Castro-Alonso, Juan Cristobal
+ Ayres, Paul
+ Paas, Fred
Dynamic Visualizations: A Two-Edged Sword? (581-604)
+ Lowe, Richard K.
Simultaneous and Sequential Presentation of Realistic and Schematic Instructional Dynamic Visualizations (605-622)
+ Nugteren, Michelle L.
+ Tabbers, Huib K.
+ Scheiter, Katharina
+ Paas, Fred
How Do You Connect Moving Dots? Insights from User Studies on Dynamic Network Visualizations (623-650)
+ Smuc, Michael
+ Federico, Paolo
+ Windhager, Florian
+ Aigner, Wolfgang
+ Zenk, Lukas
+ Miksch, Silvia
== Part VII: Interaction ==
Interaction Taxonomy for Tracking of User Actions in Visual Analytics Applications (653-670)
+ von Landesberger, Tatiana
+ Fiebig, Sebastian
+ Bremm, Sebastian
+ Kuijper, Arjan
+ Fellner, Dieter W.
Common Visualizations: Their Cognitive Utility (671-691)
+ Parsons, Paul
+ Sedig, Kamran
Distribution of Information Processing While Performing Complex Cognitive Activities with Visualization Tools (693-715)
+ Parsons, Paul
+ Sedig, Kamran
Human-Centered Interactivity of Visualization Tools: Micro- and Macro-level Considerations (717-743)
+ Sedig, Kamran
+ Parsons, Paul
+ Dittmer, Mark
+ Haworth, Robert
[3]
Cyber Security Games: A New Line of Risk
Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming
/
Blythe, John M.
/
Coventry, Lynne
Proceedings of the 2012 International Conference on Entertainment Computing
2012-09-26
p.600-603
Keywords: Information security; Behaviour change; Security games
© Copyright 2012 IFIP
Summary: Behaviour change is difficult to achieve and there are many models
identifying the factors to affect such change but few have been applied in the
security domain. This paper discusses the use of serious games to improve the
security behaviour of end-users. A new framework, based upon literature
findings, is proposed for future game design. The trust and privacy issues
related to using serious games for improving security awareness and behaviour
are highlighted.
[4]
Targeted risk communication for computer security
Posters
/
Blythe, Jim
/
Camp, Jean
/
Garg, Vaibhav
Proceedings of the 2011 International Conference on Intelligent User
Interfaces
2011-02-13
p.295-298
© Copyright 2011 ACM
Summary: Attacks on computer systems are rapidly becoming more numerous and more
sophisticated, and current preventive techniques do not seem able to keep pace.
Many successful attacks can be attributed to user errors: for example, while
focused on other tasks, users may succumb to 'social engineering' attacks such
as phishing or trojan horses. Warnings about the danger of these attacks are
often vaguely worded and given long before the dangers are realized, and are
therefore too easy to ignore. However, we hypothesize that users are more
likely to be persuaded by messages that (1) leverage mental models to describe
the dangers, (2) describe particular vulnerabilities that the user may be
exposed to and (3) are delivered close in time before the danger may actually
be realized. We discuss the design and initial implementation of a system to
achieve this. It first shows a video about a potential danger, then creates
warnings tailored to the user's environment and given at the time they may be
most useful, displaying a still frame or snippet from the video to remind the
user of the potential danger. The system uses templates of user activities as
input to a markov logic network to recognize potentially risky behaviors. This
approach can identify likely next steps that can be used to predict immediate
danger and customize warnings.
[5]
From geek to sleek: integrating task learning tools to support end users in
real-world applications
Short papers
/
Spaulding, Aaron
/
Blythe, Jim
/
Haines, Will
/
Gervasio, Melinda
Proceedings of the 2009 International Conference on Intelligent User
Interfaces
2009-02-08
p.389-394
Keywords: end user programming, interaction design, programming by demonstration,
reasoning about actions, task learning
© Copyright 2009 ACM
Summary: Numerous techniques exist to help users automate repetitive tasks; however,
none of these methods fully support end-user creation, use, and modification of
the learned tasks. We present an integrated task learning system (ITL) that
learns executable procedures based on user demonstration and instruction,
constituting a first step toward a broader solution for procedure management.
We discuss our deployment of ITL into a collaborative command-and-control
system. In this complex domain, ITL's performance with end users doing real
tasks indicates that providing multiple, integrated learning techniques both
extends functionality and improves user experience. Our experience in
integrating this system also provides key insights for future designs of
domain-independent task learning systems, specifically in supporting users'
ability to understand and edit lengthy procedures.
[6]
Case-based reasoning for procedure learning by instruction
Short papers
/
Blythe, Jim
/
Russ, Thomas
Proceedings of the 2008 International Conference on Intelligent User
Interfaces
2008-01-13
p.301-304
© Copyright 2008 ACM
Summary: To control intelligent tools that perform a variety of complex procedures,
users need to be able to both modify existing procedure descriptions and
communicate new procedures. In one approach, the user describes fragments of a
procedure with text, and the tool searches the space of potential procedures
for a match. This approach sometimes provides too little guidance for users,
yet providing templates for guidance can require an expensive knowledge
engineering effort in each new domain. We investigate the use of case-based
reasoning to help guide the user, treating previously-defined procedures in the
domain as cases. We describe domain-independent methods to find similar
procedures while the user creates or modifies a procedure, to suggest potential
steps to copy and to manage mapping the variables from the existing procedure
into the procedure being edited. In some cases, the mapping tool suggests
auxiliary steps to copy along with the desired steps, following an approach
similar to derivational analogy. We evaluate the potential of this approach
with an implemented tool, CB-Tailor, in a travel domain containing a number of
procedures that may be added by the user. Our experiences suggest that the tool
can provide useful guidance in a realistic set of situations.
[7]
Task learning by instruction in tailor
Long papers: knowledge acquisition and knowledge-based design
/
Blythe, Jim
Proceedings of the 2005 International Conference on Intelligent User
Interfaces
2005-01-10
p.191-198
© Copyright 2005 ACM
Summary: In order for intelligent systems to be applicable in a wide range of
situations, end users must be able to modify their task descriptions. We
introduce Tailor, a system that allows users to modify task information through
instruction. In this approach, the user enters a short sentence to describe the
desired change. The system maps the sentence into valid, plausible
modifications and checks for unexpected side-effects they may have, working
interactively with the user throughout the process. We conducted preliminary
tests in which subjects used Tailor to make modifications to domains drawn from
the eHow website, applying modifications posted by readers as 'tips'. In this
way the subjects acted as interpreters between Tailor and the human-generated
descriptions of modifications. Almost all the subjects were able to make all
modifications to the process descriptions with Tailor, indicating that the
interpreter role is quite natural for users.
[8]
Incremental formalization of document annotations through ontology-based
paraphrasing
Semantic annotation and integration
/
Blythe, Jim
/
Gil, Yolanda
Proceedings of the 2004 International Conference on the World Wide Web
2004-05-17
v.1
p.455-461
Keywords: document annotation, knowledge acquisition, semantic markup
© Copyright 2004 International World Wide Web Conference Committee (IW3C2)
Summary: For the manual semantic markup of documents to become wide-spread, users
must be able to express annotations that conform to ontologies (or schemas)
that have shared meaning. However, a typical user is unlikely to be familiar
with the details of the terms as defined by the ontology authors. In addition,
the idea to be expressed may not fit perfectly within a pre-defined ontology.
The ideal tool should help users find a partial formalization that closely
follows the ontology where possible but deviates from the formal representation
where needed. We describe an implemented approach to help users create
semi-structured semantic annotations for a document according to an extensible
OWL ontology. In our approach, users enter a short sentence in free text to
describe all or part of a document, and the system presents a set of potential
paraphrases of the sentence that are generated from valid expressions in the
ontology, from which the user chooses the closest match. We use a combination
of off-the-shelf parsing tools and breadth-first search of expressions in the
ontology to help users create valid annotations starting from free text. The
user can also define new terms to augment the ontology, so the potential
matches can improve over time.
[9]
Supporting plan authoring and analysis
Full Technical Papers
/
Kim, Jihie
/
Blythe, Jim
Proceedings of the 2003 International Conference on Intelligent User
Interfaces
2003-01-12
p.109-116
© Copyright 2003 ACM
Summary: Interactive tools to help users author plans or processes are essential in a
variety of domains. KANAL helps users author sound plans by simulating them,
checking for a variety of errors and presenting the results in an accessible
format that allows the user to see an overview of the plan steps or timelines
of objects in the plan. From our experience in two domains, users tend to
interleave plan authoring and plan checking while extending background
knowledge of actions. This has led us to refine KANAL to provide a high-level
overview of plans and integrate a tool for refining the background knowledge
about actions used to check plans. We report on these lessons learned and new
directions in KANAL.
[10]
An Integrated Environment for Knowledge Acquisition
/
Blythe, Jim
/
Kim, Jihie
/
Ramachandran, Surya
/
Gil, Yolanda
Proceedings of the 2001 International Conference on Intelligent User
Interfaces
2001-01-14
p.13-20
Keywords: Computing Methodologies -Artificial Intelligence - Learning (I.2.6):
Knowledge acquisition; Information Systems -Information Interfaces and
Presentation - User Interfaces (H.5.2); Design, Human Factors, Management,
Performance, Theory
© Copyright 2001 ACM
Summary: This paper describes an integrated acquisition interface that includes
several techniques previously developed to support users in various ways as
they add new knowledge to an intelligent system. As a result of this
integration, the individual techniques can take better advantage of the context
in which they are invoked and provide stronger guidance to users. We describe
the current implementation using examples from a travel planning domain, and
demonstrate how users can add complex knowledge to the system.
[11]
Generalization and Noise
/
Kodratoff, Yves
/
Manago, Michel
/
Blythe, Jim
International Journal of Man-Machine Studies
1987
v.27
n.2
p.181-204
© Copyright 1987 Academic Press
Summary: This paper describes a research project which aims at applying Machine
Learning (ML) techniques to ease Knowledge Acquisition (KA) for Knowledge Based
systems. Since noise in real life data has a drastic effect on ML, we examine
in detail problems connected with noise. The learning system integrates two
apparently distinct approaches: the numeric approach and the symbolic approach.
It uses a filtering mechanism that is driven by statistical information and by
comparison between several sources of knowledge (multi-expertise and
expert-users "cross-examination" of input). The system also attempts to
generate concepts which are resilient to noise and to improve the language of
description. While it is usually thought that noise prevents using ML
techniques in real applications, we attempt to show that on the contrary
existing techniques can be stretched to cope with noise and to obtain better
results than traditional KA techniques.