Search For:

Displaying 1-13 out of 13 total
Helping You Protect You
Found in: IEEE Security & Privacy
By M. Angela Sasse,Charles C. Palmer,Markus Jakobsson,Sunny Consolvo,Rick Wash,L. Jean Camp
Issue Date:January 2014
pp. 39-42
Guest editors M. Angela Sasse and Charles C. Palmer speak with security practitioners about what companies are doing to keep customers secure, and what users can do to stay safe.
 
Folk Security
Found in: IEEE Security & Privacy
By Rick Wash
Issue Date:November 2012
pp. 88-90
One of the most important, and most overlooked, ways that we learn is by "social learning"—by hearing stories from our friends. Stories are a valuable and underutilized tool for helping people learn how to make better and more secure d...
 
The
Found in: Hawaii International Conference on System Sciences
By Donghee Yvette Wohn, Cliff Lampe, Rick Wash, Nicole Ellison, Jessica Vitak
Issue Date:January 2011
pp. 1-10
Social network games embedded within social network sites (SNSs) such as Facebook facilitate play with
   
Coordinating donors on crowdfunding websites
Found in: Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW '14)
By Jacob Solomon, Rick Wash
Issue Date:February 2014
pp. 38-48
Crowdfunding websites like Kickstarter, Spot.Us and Donor's Choose seek to fund multiple projects simultaneously by soliciting donations from a large number of donors. Crowdfunding site designers must decide what to do with donations to projects that don't...
     
The power of the ask in social media
Found in: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work (CSCW '12)
By Rick Wash, Cliff Lampe
Issue Date:February 2012
pp. 1187-1190
Social computing and social media systems depend on contributions from users. We posit the existence of a latent demand for contribution: many users want to contribute but don't. We then test a simple interface that can induce these users to actually contr...
     
Bootstrapping wikis: developing critical mass in a fledgling community by seeding content
Found in: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work (CSCW '12)
By Jacob Solomon, Rick Wash
Issue Date:February 2012
pp. 261-264
Online communities depend on content contributed by their members. However, new communities have not yet achieved critical mass and are vulnerable to inadequate contribution. To encourage contribution, many fledgling communities seed the site with data fro...
     
Design, influence, and social technologies: techniques, impacts, and ethics
Found in: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion (CSCW '12)
By Cecilia Aragon, Joshua Introne, Karen Levy, Rick Wash, Sean Goggins, Sean Munson
Issue Date:February 2012
pp. 9-10
Our actions and opinions - "what we know and believe, how we behave and make decisions" - are embedded in and shaped by webs of social relationships. Small individual actions that flow within networks can lead to broad systemic dynamics that fundamentally ...
     
Influencing mental models of security: a research agenda
Found in: Proceedings of the 2011 workshop on New security paradigms workshop (NSPW '11)
By Emilee Rader, Rick Wash
Issue Date:September 2011
pp. 57-66
Over 80 million households in the United States have a home computer and an Internet connection. The vast majority of these are administered by people who have little computer security knowledge or training, and many users try to avoid making security deci...
     
Folk models of home computer security
Found in: Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10)
By Rick Wash
Issue Date:July 2010
pp. 1-16
Home computer systems are insecure because they are administered by untrained users. The rise of botnets has amplified this problem; attackers compromise these computers, aggregate them, and use the resulting network to attack third parties. Despite a larg...
     
Motivations to participate in online communities
Found in: Proceedings of the 28th international conference on Human factors in computing systems (CHI '10)
By Alcides Velasquez, Cliff Lampe, Elif Ozkaya, Rick Wash
Issue Date:April 2010
pp. 1927-1936
A consistent theoretical and practical challenge in the design of socio-technical systems is that of motivating users to participate in and contribute to them. This study examines the case of Everything2.com users from the theoretical perspectives of Uses ...
     
Influences on tag choices in del.icio.us
Found in: Proceedings of the ACM 2008 conference on Computer supported cooperative work (CSCW '08)
By Emilee Rader, Rick Wash
Issue Date:November 2008
pp. 21-27
Collaborative tagging systems have the potential to produce socially constructed information organization schemes. The effectiveness of tags for finding and re-finding information depends upon how individual users choose tags; however, influences on users'...
     
Security when people matter: structuring incentives for user behavior
Found in: Proceedings of the ninth international conference on Electronic commerce (ICEC '07)
By Jeffrey K. MacKie-Mason, Rick Wash
Issue Date:August 2007
pp. 7-14
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives provided to induce desired behavior. Sometimes these incentives are properly aligned, an...
     
Incentive design for home computer security
Found in: CHI '07 extended abstracts on Human factors in computing systems (CHI '07)
By Rick Wash
Issue Date:April 2007
pp. 1681-1684
Home computer users frequently lack the skills necessary to ensure proper security. Hackers exploit this to control large networks of computers (.botnets.) that are used for spam, extortion, and fraud. I integrate ideas from psychology and economics to des...
     
 1