Upcoming Courses

go to course
User-Centred Design - Module 2
Starts tomorrow LAST CALL!
go to course
Design Thinking: The Beginner's Guide
Starts the day after tomorrow !
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Iulia Ion

Add description
Rename / change spelling
Add publication
 

Publications by Iulia Ion (bibliography)

 what's this?
2011
 
Edit | Del

Ion, Iulia, Sachdeva, Niharika, Kumaraguru, Ponnurangam and apkun, Srdjan (2011): Home is safer than the cloud!: privacy concerns for consumer cloud storage. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 13.

Several studies ranked security and privacy to be major areas of concern and impediments of cloud adoption for companies, but none have looked into end-users' attitudes and practices. Not much is known about consumers' privacy beliefs and expectations for cloud storage, such as web-mail, document and photo sharing platforms, or about users' awareness of contractual terms and conditions. We conducted 36 in-depth interviews in Switzerland and India (two countries with different privacy perceptions and expectations); and followed up with an online survey with 402 participants in both countries. We study users' privacy attitudes and beliefs regarding their use of cloud storage systems. Our results show that privacy requirements for consumer cloud storage differ from those of companies. Users are less concerned about some issues, such as guaranteed deletion of data, country of storage and storage outsourcing, but are uncertain about using cloud storage. Our results further show that end-users consider the Internet intrinsically insecure and prefer local storage for sensitive data over cloud storage. However, users desire better security and are ready to pay for services that provide strong privacy guarantees. Participants had misconceptions about the rights and guarantees their cloud storage providers offers. For example, users believed that their provider is liable in case of data loss, does not have the right to view and modify user data, and cannot disable user accounts. Finally, our results show that cultural differences greatly influence user attitudes and beliefs, such as their willingness to store sensitive data in the cloud and their acceptance that law enforcement agencies monitor user accounts. We believe that these observations can help in improving users privacy in cloud storage systems.

© All rights reserved Ion et al. and/or ACM Press

2010
 
Edit | Del

Ion, Iulia, Langheinrich, Marc, Kumaraguru, Ponnurangam and Capkun, Srdjan (2010): Influence of user perception, security needs, and social factors on device pairing method choices. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 6.

Recent years have seen a proliferation of secure device pairing methods that try to improve both the usability and security of today's de-facto standard -- PIN-based authentication. Evaluating such improvements is difficult. Most comparative laboratory studies have so far mainly focused on completeness, trying to find the single best method among the dozens of proposed approaches -- one that is both rated the most usable by test subjects, and which provides the most robust security guarantees. This search for the "best" pairing method, however, fails to take into account the variety of situations in which such pairing protocols may be used in real life. The comparative study reported here, therefore, explicitly situates pairing tasks in a number of more realistic situations. Our results indicate that people do not always use the easiest or most popular method -- they instead prefer different methods in different situations, based on the sensitivity of data involved, their time constraints, and the social conventions appropriate for a particular place and setting. Our study also provides qualitative data on factors influencing the perceived security of a particular method, the users' mental models surrounding security of a method, and their security needs.

© All rights reserved Ion et al. and/or their publisher

 
Edit | Del

Mazurek, Michelle L., Arsenault, J. P., Bresee, Joanna, Gupta, Nitin, Ion, Iulia, Johns, Christina, Lee, Daniel, Liang, Yuan, Olsen, Jenny, Salmon, Brandon, Shay, Richard, Vaniea, Kami, Bauer, Lujo, Cranor, Lorrie Faith, Ganger, Gregory R. and Reiter, Michael K. (2010): Access control for home data sharing: evaluating social acceptability. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems 2010. pp. 645-654.

As digital content becomes more prevalent in the home, non-technical users are increasingly interested in sharing that content with others and accessing it from multiple devices. Not much is known about how these users think about controlling access to this data. To better understand this, we conducted semi-structured, in-situ interviews with 33 users in 15 households. We found that users create ad-hoc access-control mechanisms that do not always work; that their ideal policies are complex and multi-dimensional; that a priori policy specification is often insufficient; and that people's mental models of access control and security are often misaligned with current systems. We detail these findings and present a set of associated guidelines for designing usable access-control systems for the home environment.

© All rights reserved Mazurek et al. and/or their publisher

 
Add publication
Show list on your website
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 
 

Changes to this page (author)

05 Apr 2012: Modified
02 Nov 2010: Modified
02 Nov 2010: Added

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/iulia_ion.html

Upcoming Courses

go to course
User-Centred Design - Module 2
Starts tomorrow LAST CALL!
go to course
Design Thinking: The Beginner's Guide
Starts the day after tomorrow !
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading