Research Topic

Human-Centric Security and Privacy

About this Research Topic

Users are considered as the weakest link for security and privacy in cyberspace. Many recent data breaches are attributed to users, deliberate or accidental. Though there is a need to develop novel security and privacy technologies, it has been recognised that technological solutions alone cannot solve the security and privacy problems in emerging ubiquitous applications such as mobile systems, autonomous vehicle, and the Internet of Things (IoT). For instance, users are often hardly able to understand the security and privacy related messages generated by these systems since they are written by tech-savvy developers; even computer science graduates have difficulties in understanding some of the security and privacy messages generated by modern computer applications including mobile phones, web applications, etc. The challenge is how to build the security and privacy solutions usable by end-users. Towards addressing this challenge, we need a paradigm shift on how we address security and privacy problems, moving away from a technology focus to the use of socio-technological dimension.

This Article Collection aims to report the novel socio-technological solutions developed for usable security and privacy. Some of the research topics in this area include, but are not limited to:
- Usable security by design;
- Usable privacy by design;
- Constructing user-centric privacy and security in mobile and IoT applications;
- HCI for security and privacy;
- Usable authentication;
- Usability of online security indicators;
- Usable guidelines for security and privacy;
- Consumers’ views on privacy and security;
- Case studies in usable security and privacy;
- Human-centric Privacy-aware Data Management and Sharing.

This article collection welcomes diverse article types, including Original Research, Reviews, and Perspective Papers. Upon consultation with the Editors, we may also include Hypothesis & Theory papers, Technology Reports, Mini Reviews, Code, Data Report, General Commentaries, and other article types.


Keywords: human-centric, security, privacy, bigdata, IoT


Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.

Users are considered as the weakest link for security and privacy in cyberspace. Many recent data breaches are attributed to users, deliberate or accidental. Though there is a need to develop novel security and privacy technologies, it has been recognised that technological solutions alone cannot solve the security and privacy problems in emerging ubiquitous applications such as mobile systems, autonomous vehicle, and the Internet of Things (IoT). For instance, users are often hardly able to understand the security and privacy related messages generated by these systems since they are written by tech-savvy developers; even computer science graduates have difficulties in understanding some of the security and privacy messages generated by modern computer applications including mobile phones, web applications, etc. The challenge is how to build the security and privacy solutions usable by end-users. Towards addressing this challenge, we need a paradigm shift on how we address security and privacy problems, moving away from a technology focus to the use of socio-technological dimension.

This Article Collection aims to report the novel socio-technological solutions developed for usable security and privacy. Some of the research topics in this area include, but are not limited to:
- Usable security by design;
- Usable privacy by design;
- Constructing user-centric privacy and security in mobile and IoT applications;
- HCI for security and privacy;
- Usable authentication;
- Usability of online security indicators;
- Usable guidelines for security and privacy;
- Consumers’ views on privacy and security;
- Case studies in usable security and privacy;
- Human-centric Privacy-aware Data Management and Sharing.

This article collection welcomes diverse article types, including Original Research, Reviews, and Perspective Papers. Upon consultation with the Editors, we may also include Hypothesis & Theory papers, Technology Reports, Mini Reviews, Code, Data Report, General Commentaries, and other article types.


Keywords: human-centric, security, privacy, bigdata, IoT


Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.

About Frontiers Research Topics

With their unique mixes of varied contributions from Original Research to Review Articles, Research Topics unify the most influential researchers, the latest key findings and historical advances in a hot research area! Find out more on how to host your own Frontiers Research Topic or contribute to one as an author.

Topic Editors

Loading..

Submission Deadlines

08 November 2019 Manuscript
09 December 2019 Manuscript Extension

Participating Journals

Manuscripts can be submitted to this Research Topic via the following journals:

Loading..

Topic Editors

Loading..

Submission Deadlines

08 November 2019 Manuscript
09 December 2019 Manuscript Extension

Participating Journals

Manuscripts can be submitted to this Research Topic via the following journals:

Loading..
Loading..

total views article views article downloads topic views

}
 
Top countries
Top referring sites
Loading..

Comments

Loading..

Add a comment

Add comment
Back to top