SlideShare a Scribd company logo
1 of 32
Access Control at Home:  Attitudes, Needs, Practices Michelle Mazurek J.P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion 1 , Christina Johns, Daniel Jonggyu Lee, Yuan Liang, Jennifer Olsen, Brandon Salmon, Rich Shay, Kami Vaniea  Lujo Bauer, Lorrie Cranor, Greg Ganger, Mike Reiter 2   Carnegie Mellon University,  1 ETH Zürich,  2 UNC Chapel Hill
Access control comes home Tax return The Sopranos Sesame Street The Wiggles The Sopranos The Sopranos Sesame Street Sesame Street The Wiggles The Wiggles Tax return Tax return Tax return The Sopranos Sesame Street The Wiggles
Old approaches aren’t enough ,[object Object],[object Object],[object Object],[object Object],[object Object]
Our goal: A more usable approach ,[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object]
Exploring access control at home ,[object Object],[object Object],[object Object],[object Object],[object Object]
Designing a user study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Question structure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data analysis ,[object Object],[object Object],[object Object],[object Object]
Data analysis -- example “ If I use a work file, I’m very careful not to step away without logging out.” Code Person Page Log out / lock computer when getting up 10A 3
Study demographics ,[object Object],[object Object],Households People Families 6 16 Couples 5 10 Roommates 4 11 Total 15 37
Outline ,[object Object],[object Object],[object Object],[object Object]
Four key findings ,[object Object],[object Object],[object Object],[object Object]
F1: Current methods are insufficient ,[object Object]
Current methods are insufficient ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
F2: Policy needs are complex ,[object Object],[object Object],[Reeder08] shared mixed restricted
Dimensions beyond person ,[object Object],[object Object],[object Object]
Dimensions beyond person ,[object Object],[object Object],[object Object],[object Object]
F3: Permission and control ,[object Object],[object Object],[object Object]
Setting policy doesn’t convey control ,[object Object],[object Object]
Up-front policy isn’t enough ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
F4: Mental models ≠ systems ,[object Object],[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object]
Design guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object]
More design guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Even more guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
References ,[object Object],[object Object],[object Object],[object Object],[object Object]
References (II) ,[object Object],[object Object],[object Object],[object Object]
References (III) ,[object Object],[object Object],[object Object],[object Object]
References (IV) ,[object Object],[object Object]

More Related Content

Similar to Home Access Control Attitudes and Practices

A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Inspiration Architecture: Oregon Virtual Reference Summit 2014
Inspiration Architecture: Oregon Virtual Reference Summit 2014Inspiration Architecture: Oregon Virtual Reference Summit 2014
Inspiration Architecture: Oregon Virtual Reference Summit 2014Peter Morville
 
Inspiration Architecture: The Future of Libraries (Library 2.013)
Inspiration Architecture: The Future of Libraries (Library 2.013)Inspiration Architecture: The Future of Libraries (Library 2.013)
Inspiration Architecture: The Future of Libraries (Library 2.013)Peter Morville
 
Inspiration Architecture: The Future of Libraries (Academic Library Directors...
Inspiration Architecture: The Future of Libraries (Academic Library Directors...Inspiration Architecture: The Future of Libraries (Academic Library Directors...
Inspiration Architecture: The Future of Libraries (Academic Library Directors...Peter Morville
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesJunie Kwon
 
Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's PresentationMediabistro
 
Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...The Higher Education Academy
 
Frances Ryan DARTS5 presentation
Frances Ryan DARTS5 presentationFrances Ryan DARTS5 presentation
Frances Ryan DARTS5 presentationARLGSW
 
Personal online reputations: Managing what you can’t control
Personal online reputations: Managing what you can’t controlPersonal online reputations: Managing what you can’t control
Personal online reputations: Managing what you can’t controlFrances Ryan
 
Discussion 1 Affinity Group Checkpoint #4This week, you will on
Discussion 1 Affinity Group Checkpoint #4This week, you will onDiscussion 1 Affinity Group Checkpoint #4This week, you will on
Discussion 1 Affinity Group Checkpoint #4This week, you will onVinaOconner450
 
Ethics and information architecture - The 6th Academics and Practitioners Rou...
Ethics and information architecture - The 6th Academics and Practitioners Rou...Ethics and information architecture - The 6th Academics and Practitioners Rou...
Ethics and information architecture - The 6th Academics and Practitioners Rou...Sarah Rice
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
 
Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...ARDC
 
100 Funny Argumentative Essay Topic Ideas - Owlca
100 Funny Argumentative Essay Topic Ideas - Owlca100 Funny Argumentative Essay Topic Ideas - Owlca
100 Funny Argumentative Essay Topic Ideas - OwlcaJackie Ramirez
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Explainable AI is not yet Understandable AI
Explainable AI is not yet Understandable AIExplainable AI is not yet Understandable AI
Explainable AI is not yet Understandable AIepsilon_tud
 

Similar to Home Access Control Attitudes and Practices (20)

A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Inspiration Architecture: Oregon Virtual Reference Summit 2014
Inspiration Architecture: Oregon Virtual Reference Summit 2014Inspiration Architecture: Oregon Virtual Reference Summit 2014
Inspiration Architecture: Oregon Virtual Reference Summit 2014
 
Inspiration Architecture: The Future of Libraries (Library 2.013)
Inspiration Architecture: The Future of Libraries (Library 2.013)Inspiration Architecture: The Future of Libraries (Library 2.013)
Inspiration Architecture: The Future of Libraries (Library 2.013)
 
A brave new world: student surveillance in higher education
A brave new world: student surveillance in higher educationA brave new world: student surveillance in higher education
A brave new world: student surveillance in higher education
 
Inspiration Architecture: The Future of Libraries (Academic Library Directors...
Inspiration Architecture: The Future of Libraries (Academic Library Directors...Inspiration Architecture: The Future of Libraries (Academic Library Directors...
Inspiration Architecture: The Future of Libraries (Academic Library Directors...
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App Services
 
Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's Presentation
 
Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...
 
Frances Ryan DARTS5 presentation
Frances Ryan DARTS5 presentationFrances Ryan DARTS5 presentation
Frances Ryan DARTS5 presentation
 
Personal online reputations: Managing what you can’t control
Personal online reputations: Managing what you can’t controlPersonal online reputations: Managing what you can’t control
Personal online reputations: Managing what you can’t control
 
Discussion 1 Affinity Group Checkpoint #4This week, you will on
Discussion 1 Affinity Group Checkpoint #4This week, you will onDiscussion 1 Affinity Group Checkpoint #4This week, you will on
Discussion 1 Affinity Group Checkpoint #4This week, you will on
 
Ethics and information architecture - The 6th Academics and Practitioners Rou...
Ethics and information architecture - The 6th Academics and Practitioners Rou...Ethics and information architecture - The 6th Academics and Practitioners Rou...
Ethics and information architecture - The 6th Academics and Practitioners Rou...
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
 
Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...
 
100 Funny Argumentative Essay Topic Ideas - Owlca
100 Funny Argumentative Essay Topic Ideas - Owlca100 Funny Argumentative Essay Topic Ideas - Owlca
100 Funny Argumentative Essay Topic Ideas - Owlca
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Explainable AI is not yet Understandable AI
Explainable AI is not yet Understandable AIExplainable AI is not yet Understandable AI
Explainable AI is not yet Understandable AI
 

Home Access Control Attitudes and Practices

  • 1. Access Control at Home: Attitudes, Needs, Practices Michelle Mazurek J.P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion 1 , Christina Johns, Daniel Jonggyu Lee, Yuan Liang, Jennifer Olsen, Brandon Salmon, Rich Shay, Kami Vaniea Lujo Bauer, Lorrie Cranor, Greg Ganger, Mike Reiter 2 Carnegie Mellon University, 1 ETH Zürich, 2 UNC Chapel Hill
  • 2. Access control comes home Tax return The Sopranos Sesame Street The Wiggles The Sopranos The Sopranos Sesame Street Sesame Street The Wiggles The Wiggles Tax return Tax return Tax return The Sopranos Sesame Street The Wiggles
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Data analysis -- example “ If I use a work file, I’m very careful not to step away without logging out.” Code Person Page Log out / lock computer when getting up 10A 3
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.  
  • 29.
  • 30.
  • 31.
  • 32.

Editor's Notes

  1. Presence = most; location = many Device, time of day not as popular
  2. - Violations can happen too fast to prevent - Can’t necessarily monitor across the room