Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] ubicomp (ubiquitous computing) Faces prototype design HCI and Confab system uncued recall 2nd unisog Unix disk sanitization and file access, securing password restrictions unlink( ) (POSIX), changing semantics of URL hiding, phishing attacks and usability benchmark studies biometric authentication systems, evaluating 2nd criterion for designing/evaluating challenge questions systems 2nd engineering HCI research graphical passwords hard drives 2nd in design/development phases of product development in postrelease phase of product development in privacy policy management tool, case study policy authoring, evaluating privacy needs, identifying prototype, designing/evaluating users, interviewing in requirements phase of product development in security application, case study interface, testing ROI analysis work context, field study of in software/hardware life cycle keystroke biometrics objectives performance data PGP program v5.0 PKIs and portable devices privacy and P2P systems remote data collection/system evaluation smart cards systemic approach to unique aspects of, in privacy/security domain user error and value-sensitive design usable biometrics USB tokens 2nd recommendations usability study of aim/scope of context/roles definition measurement apparatus results/interpretation user selection use limitation, privacy criterion for challenge questions system USENET newsgroups, patch distribution user experiences, eBay user profiles user group meetings, survey/questionnaire data collection/analysis users actions of phishing attack defense alerting, Bugnosis anonymity sets attackers and, exploiting differences awareness of distributed/collaborative applications information disclosure privacy-protective behaviors web security, Bugnosis behavior in sociotechnical systems 2nd policing, consequences of security culture, building beliefs/attitudes 2nd browsers, hidden information children/adolescents clustering, interface design approach compliance of consent indications decision-making process demands on reducing 2nd educating privacy management Shred Trash command efforts of, minimizing expectations, security operations experiences biometric authentication and on eBay feedback in postrelease gesture-based configuration hard drives, directly addressable data identifying keystroke digraphs in academic environments in e-commerce transactions, assessing risks information about collecting/analyzing with online tools concerns about publicizing downloading files user fine-grained control informing through interaction design, web browsers knowledge of, web security study meaningful actions, system configuration supporting 2nd 3rd minimal distraction of motivating 2nd partnership with passwords remembering written down 2nd perceptions of, phishing attacks and PKI and privacy issues 2nd 3rd 4th Bugnosis privacy-analysis tool coarse-grained control 2nd difficulty articulating 2nd information about, providing information, supporting flow of interviews about P3P user agent design profiles of 2nd 3rd protection, designing systems psychological manipulation by interface requirements of 2nd rules for shredding files skills of accommodating exploiting psychological acceptability applied to support calls from, analysis of system design/development system design/development, involving in tracking training, biometric authentication systems trust and types of, accommodating all understanding of security weakest link property 2nd 3rd 4th work context, field studies of work practices 2nd |