Usable Security and Privacy in Mobile and Wearable Computing
In general, the security of an information system is determined by the security capabilities of the weakest link in the chain.
- Starts at
TU Wien, Campus Argentinierstraße
1040 Vienna, Argentinierstraße 8
In general, the security of an information system is determined by the security capabilities of the weakest link in the chain. In many cases, the weakest link in the chain is the user. Therefore, an integration of human-computer-interaction aspects into security research is necessary in order to prevent systems from being compromised. At this time, not only devices such as desktop computers but also mobile and wearable devices are connected to the Internet and collecting data of their users and surroundings. This implies distinct security, privacy and usability challenges. In the course of this talk, I want to give a brief overview on how better usability can improve overall security. I furthermore want to present hot-topics in usable security and privacy research and our findings on privacy technology for mobile and wearable computing. The overall goal is to establish a discourse on how human-computer interaction methods can be used to design secure and usable systems for mobile and wearable computers.
Katharina Krombholz is researcher at SBA Research. Her research focuses on usable security and digital forensics. Since 2012, she is a Ph.D. student at the Vienna University of Technology. She received a master’s degree in Media Informatics. In 2013, she spent a semester as research intern at the National Institute of Informatics in Tokyo, Japan. Besides her research activities at SBA Research, she is currently teaching graduate courses on digital forensics and cloud security at Vienna University of Technology and the University of Applied Sciences FH Campus Wien. Katharina is vice-chair of the ACM SIGSAC Vienna Chapter.
This talk is organized by the OutsideTheBox at the Institute of Design and Assessmet of Technology.
- Katharina Krombholz, SBA Research
Note: This is one of the thousands of items we imported from the old website. We’re in the process of reviewing each and every one, but if you notice something strange about this particular one, please let us know. — Thanks!