Acknowledgments


In fall of 2003, we discovered that we were both thinking about editing a book on usability and security. We were in the middle of other projects at the time, but several months later we talked about it again and decided to work together on a proposal and shop it around to publishers. Our original plan was to spend about two years recruiting and editing chapters. However, when Deborah Russell at O'Reilly saw our proposal, she asked us if we could finish the book in less than a year. We agreed, and in May 2004, we began recruiting chapters.

That May we were completely engaged in the topic of usability and security. Together, we were in the process of editing a special issue of IEEE Security & Privacy on this topic, Lorrie was organizing a Workshop on Usable Privacy and Security Software, and Simson was finishing up a Ph.D. thesis in the area. As a result, we had a good idea of who was doing work in the domain. Most of the prospective authors we approached agreed to participate, and by September we started receiving first drafts of chapters.

We are indebted to the 62 authors who contributed the 32 chapters not written by us. Without their efforts this book would not have been possible. Unlike many edited volumes in which most chapters are slightly edited versions of conference papers, this book contains many completely original chapters that were written specifically for this book. In addition, with the exception of the classic papers in the final part of this book, the chapters that did begin as conference papers have been substantially reworked to reflect the style and emphasis of this book. We appreciate the authors' efforts to accommodate our many requests to refocus their chapters and highlight practical advice. In addition to writing and revising their own chapters, the authors also helped to review each other's chapters. As a result, every chapter in this book has benefited from the feedback of at least three reviewers.

We would like to thank the members of the CMU Usable Privacy and Security Laboratory who reviewed draft chapters, especially Rob Reeder, Cynthia Kuo, Chris Long, Jason Hong, Serge Egelman, and Matthew Geiger. We would also like to thank Robert Miller, Min Wu, and Ariel Rideout at MIT for their comments.

We are grateful to Beth Rosenberg for helping us edit several of the most difficult and demanding chapters.

Lorrie would like to thank her husband, Chuck, and her children, Shane and Maya, for all their love and support while she worked on this book. Simson would like to thank his wife, Beth, and his children, Sonia, Jared, and Draken, who barely saw their father for nearly eight months while he worked on this book, another book, and his dissertation.

We would like to thank Deborah Russell, our wonderful editor at O'Reilly, for her great editing job and for helping to keep us (mostly) on schedule. And thanks as well to the entire O'Reilly production team, including Mary Brady, the production editor; Audrey Doyle, the copyeditor; Rob Romano, the illustrator; and Nancy Crumpton, the indexer.

In addition, many of the chapters provide individual acknowledgments.



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net