MEETING-DATE:August 11, 2010 MEETING-LOCATION:DC 1331 MEETING-TIME:1:30 MEETING-CHAIR:Matthew Thorne MEETING-CHAIRPIC:thorne.jpg COFFEE-HOUR-LAST-WEEK:Alex COFFEE-HOUR-THIS-WEEK:Ed Lank COFFEE-HOUR-NEXT-WEEK:Matthew Thorne FORTH-DATE1:August 18, 2010 FORTH-DATE2:August 25, 2010 FORTH-DATE3:August 31, 2010 FORTH-DATE4:September 7, 2010 FORTH-LOCATION1:DC 1331 1:30 FORTH-LOCATION2:DC 1331 1:30 FORTH-LOCATION3:DC 1331 1:30 FORTH-LOCATION4:DC 1331 1:30 FORTH-CHAIR1:Zainab AlMeraj FORTH-CHAIR2:Bill Cowan FORTH-CHAIR3:Gabriel Esteves FORTH-CHAIR4:Elodie Fourquet FORTH-CHAIRPIC1:zainab.jpg FORTH-CHAIRPIC2:cowan_unflipped.gif FORTH-CHAIRPIC3:rgesteve.jpg FORTH-CHAIRPIC4:elodie.jpg FORTH-TP1:Mike Terry FORTH-TP2:Matthew Thorne FORTH-TP3:Zainab AlMeraj FORTH-TP4:Bill Cowan FORTH-TPPIC1:michael_terry.jpg FORTH-TPPIC2:thorne.jpg FORTH-TPPIC3:zainab.jpg FORTH-TPPIC4:cowan_unflipped.gif TPNAME:Ed Lank TPTITLE:Privacy and Security Personas TPABSTRACT:Usable privacy and security (PAS) has become a significant area of interest for many people in both industry and academia. A better understanding of the users is animportant factor in the design of privacy and security tools. However, users of these tools are a heterogeneous group, and many past studies of user characteristics in the security and privacy domain have looked only at a small subset of factors to define differences between groups of users.The goal of this research is to critically look at the difference between people, their opinions and habits, when it comes to issues of privacy and security. By conducting and analyzing 32 in-depth qualitative interviews we identify five different types of prototypical users: Fundamentalist, Lazy Experts, Technicians, Struggling Amateurs, and the Marginally Aware. Through an understanding of the different types of users, PAS toolscan be more carefully tailored either to individual types of users, or to various different types of users who make use of these tools. TPPIC:ed.jpg DIONE: DITWO: DITHREE: DIFOUR: AIONE:Poster! AITWO: AITHREE: AIFOUR: DMONE: DMTWO: DMTHREE: DMFOUR: SEMINARS:
2010 Aug 12, 10:30 - Programming Languages Lab PhD Seminar
Azin Ashkan, graduate student, David R. Cheriton School of Comp. Sci., Univ. Waterloo
Intent-Aware Effectiveness Measures in Retrieval Evaluation
2010 Aug 12, 11:30 - Waterloo Formal Methods PhD Seminar
Ali Taleghani, PhD candidate, David R. Cheriton School of Comp. Sci, Univ. Waterloo
State-Space Coverage Estimation
2010 Aug 12, 13:30 - Waterloo Formal Methods PhD Seminar
Ali Taleghani, PhD candidate, David R. Cheriton School of Comp. Sci, Univ. Waterloo
Search Carrying Code
2010 Aug 13, 10:30 - Algorithms and Complexity Group Master's Thesis Presentation
Elena Ruiz, graduate student, David R. Cheriton School of Comp. Sci., Univ. Waterloo
Drawing planar graphs with prescribed face areas
2010 Aug 16, 15:00 - Artificial Intelligence Lab Master's Thesis Presentation
Yichuan (Charlie) Tang, graduate student, David R. Cheriton School of Comp. Sci., Univ. Waterloo and the Centre for Theoretical Neural Science
Robust Visual Recognition Using Multilayer Generative Neural Networks
2010 Aug 17, 12:00 - Institute for Quantum Computing PhD Seminar
Ansis Rosmanis, PhD candidate, David R. Cheriton School of Comp. Sci., Univ. Waterloo
Quantum snake walk on the glued trees graph
2010 Aug 17, 14:30 - Artificial Intelligence Lab Master's Thesis Presentation
Feng-Xuan Choo, graduate student, David R. Cheriton School of Computer Science, Univ. of Waterloo
Serial Memory in Spiking Neurons
2010 Aug 18, 13:00 - Human-Computer Interaction Master's Thesis Presentation
Janna-Lynn Weber, graduate student, David R. Cheriton School of Computer Science, Univ. of Waterloo
Privacy and Security Attitudes, Beliefs and Behaviours: Informing Future Tool Design