Too Much Information : Questioning Security in a Post-Digital Society. / Coles-Kemp, Lizzie; Jensen, Rikke Bjerg; Heath, Claude P. R.

CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, 2020. p. 1-14.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Too Much Information : Questioning Security in a Post-Digital Society. / Coles-Kemp, Lizzie; Jensen, Rikke Bjerg; Heath, Claude P. R.

CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, 2020. p. 1-14.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Coles-Kemp, L, Jensen, RB & Heath, CPR 2020, Too Much Information: Questioning Security in a Post-Digital Society. in CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, pp. 1-14. https://doi.org/10.1145/3313831.3376214

APA

Coles-Kemp, L., Jensen, R. B., & Heath, C. P. R. (2020). Too Much Information: Questioning Security in a Post-Digital Society. In CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1-14). ACM. https://doi.org/10.1145/3313831.3376214

Vancouver

Coles-Kemp L, Jensen RB, Heath CPR. Too Much Information: Questioning Security in a Post-Digital Society. In CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM. 2020. p. 1-14 https://doi.org/10.1145/3313831.3376214

Author

Coles-Kemp, Lizzie ; Jensen, Rikke Bjerg ; Heath, Claude P. R. / Too Much Information : Questioning Security in a Post-Digital Society. CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, 2020. pp. 1-14

BibTeX

@inproceedings{24504cf2657e4177977fed5e6f588139,
title = "Too Much Information: Questioning Security in a Post-Digital Society",
abstract = "Whilst user- and people-centered design are accepted routes for digital services, they are less commonly used in the design of technologies that control access to data and the security of information. The ubiquity of both technology and programmes such as ``digital by default'' as well as the weaving of digital systems into the everyday fabric of society, create an environment in which people and technology become enmeshed. Such an environment might be termed ``post-digital'' and its security is dependent on a people-centered approach to its design. In this paper we present a study that uses critical design techniques coupled with critical security analysis to examine how security might be approached in a post-digital context. We call for a paradigm shift towards a people-centered security practice and using a case study then make practical recommendations as to how this shift might be achieved. ",
author = "Lizzie Coles-Kemp and Jensen, {Rikke Bjerg} and Heath, {Claude P. R}",
year = "2020",
month = apr,
doi = "10.1145/3313831.3376214",
language = "English",
pages = "1--14",
booktitle = "CHI '20",
publisher = "ACM",

}

RIS

TY - GEN

T1 - Too Much Information

T2 - Questioning Security in a Post-Digital Society

AU - Coles-Kemp, Lizzie

AU - Jensen, Rikke Bjerg

AU - Heath, Claude P. R

PY - 2020/4

Y1 - 2020/4

N2 - Whilst user- and people-centered design are accepted routes for digital services, they are less commonly used in the design of technologies that control access to data and the security of information. The ubiquity of both technology and programmes such as ``digital by default'' as well as the weaving of digital systems into the everyday fabric of society, create an environment in which people and technology become enmeshed. Such an environment might be termed ``post-digital'' and its security is dependent on a people-centered approach to its design. In this paper we present a study that uses critical design techniques coupled with critical security analysis to examine how security might be approached in a post-digital context. We call for a paradigm shift towards a people-centered security practice and using a case study then make practical recommendations as to how this shift might be achieved.

AB - Whilst user- and people-centered design are accepted routes for digital services, they are less commonly used in the design of technologies that control access to data and the security of information. The ubiquity of both technology and programmes such as ``digital by default'' as well as the weaving of digital systems into the everyday fabric of society, create an environment in which people and technology become enmeshed. Such an environment might be termed ``post-digital'' and its security is dependent on a people-centered approach to its design. In this paper we present a study that uses critical design techniques coupled with critical security analysis to examine how security might be approached in a post-digital context. We call for a paradigm shift towards a people-centered security practice and using a case study then make practical recommendations as to how this shift might be achieved.

U2 - 10.1145/3313831.3376214

DO - 10.1145/3313831.3376214

M3 - Conference contribution

SP - 1

EP - 14

BT - CHI '20

PB - ACM

ER -