Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Conceptions of Trust: How Designers ...
~
Birge, Colin.
Linked to FindBook
Google Book
Amazon
博客來
Conceptions of Trust: How Designers Approach Usable Privacy and Security.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Conceptions of Trust: How Designers Approach Usable Privacy and Security./
Author:
Birge, Colin.
Description:
249 p.
Notes:
Source: Dissertation Abstracts International, Volume: 75-02(E), Section: B.
Contained By:
Dissertation Abstracts International75-02B(E).
Subject:
Information Technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3599669
ISBN:
9781303493430
Conceptions of Trust: How Designers Approach Usable Privacy and Security.
Birge, Colin.
Conceptions of Trust: How Designers Approach Usable Privacy and Security.
- 249 p.
Source: Dissertation Abstracts International, Volume: 75-02(E), Section: B.
Thesis (Ph.D.)--University of Washington, 2013.
Designers who create user interfaces are frequently required to ask users for personal information. For the user, this is a "trust question": Do I, the user, trust the system or entity that is asking me for this information? The creation and management of these trust questions is an important aspect of the research field called usable privacy and security. However, most working designers do not focus exclusively on usable privacy and security problems. Decomposition and modularity of trust and usable privacy and security issues are problematic for working designers.
ISBN: 9781303493430Subjects--Topical Terms:
1030799
Information Technology.
Conceptions of Trust: How Designers Approach Usable Privacy and Security.
LDR
:02887nam a2200301 4500
001
1960288
005
20140609073133.5
008
150210s2013 ||||||||||||||||| ||eng d
020
$a
9781303493430
035
$a
(MiAaPQ)AAI3599669
035
$a
AAI3599669
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Birge, Colin.
$3
2095915
245
1 0
$a
Conceptions of Trust: How Designers Approach Usable Privacy and Security.
300
$a
249 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-02(E), Section: B.
500
$a
Advisers: Beth Kolko; Jennifer Turns.
502
$a
Thesis (Ph.D.)--University of Washington, 2013.
520
$a
Designers who create user interfaces are frequently required to ask users for personal information. For the user, this is a "trust question": Do I, the user, trust the system or entity that is asking me for this information? The creation and management of these trust questions is an important aspect of the research field called usable privacy and security. However, most working designers do not focus exclusively on usable privacy and security problems. Decomposition and modularity of trust and usable privacy and security issues are problematic for working designers.
520
$a
Studies in the usable privacy and security field have traditionally focused on the usability of specific interface elements, or on a specific usable privacy and security problem. This dissertation explores how designers approach and handle these trust questions in their design process. A multi-modal study investigates how designers conceive of usable privacy and security in their daily work. The object of study is a working designer for whom privacy and security is not a primary task in their daily job. The study uses a survey based on a snowball sample of professional design online forums and semi-structured interviews to explore the attitudes and conceptual models of designers who produce designs involving "trust questions.".
520
$a
The results showed that working designers are interested in usable privacy and security issues but often have problems decomposing and modularizing the problem space of usable privacy and security. Usable privacy and security problems are seen as important in the abstract but are hard to identify and engage as part of day-to-day work. To reach the shared goal of making it easy for working designers to achieve positive usable privacy and security outcomes including an increased sense of user satisfaction and safety, it will be important for the research community to find ways to assist working designers with that decomposition and modularization process.
590
$a
School code: 0250.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Design and Decorative Arts.
$3
1024640
690
$a
0489
690
$a
0389
710
2
$a
University of Washington.
$b
Human Centered Design and Engineering.
$3
2095916
773
0
$t
Dissertation Abstracts International
$g
75-02B(E).
790
$a
0250
791
$a
Ph.D.
792
$a
2013
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3599669
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9255116
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login