The Swirl Project:
Effective Security Through Visualization
 

Swirl Publications

Journal publications

  1. DePaula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D., Ren, J., Rode, J., and Silva Filho, R. (2005). In the Eye of the Beholder: A Visualization-based Approach to Information System Security. International Journal of Human-Computer Studies (IJHCS) Special Issue on HCI Research in Privacy and Security, 63(1-2), 5-24.
  2. Reddy, M., Dourish, P., and Pratt, W. (2006). Temporality in Medical Work: Time also matters. Computer-Supported Cooperative Work , 15(1), 29-53.
  3. Dourish, P. and Anderson, K. (2006). Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction , 21(3), 319-342.
  4. Williams, A. and Dourish, P. (2006). Reimagining the City: The Cultural Dimensions of Urban Computing. IEEE Computer , 39(9), 38-43.
  5. Dourish, P. and Bell, G. (2007). The Infrastructure of Experience and the Experience of Infrastructure: Meaning and Structure in Everyday Encounters with Space . Environment and Planning B: Planning and Design . Environment and Planning B: Planning and Design, 34(3), 414-430.
  6. Bell, G. and Dourish, P. (2007). Back to the Shed: Gendered Visions of Technology and Domesticity. Personal and Ubiquitous Computing, 11(5), 373-381.
  7. Bell, G. and Dourish, P. (2007). Yesterday's Tomorrows: Notes on Ubiquitous Computing's Dominant Vision. Personal and Ubiquitous Computing, 11(2), 133-143.
  8. Brewer, J., Bassoli, A., Martin, K., Dourish, P., and Mainwaring, S. (2007). Aesthetic Journeys: Rethinking Urban Computing. IEEE Pervasive Computing , 6(3), July-September, 39-45.

Conferences and Workshops

  1. Ren, J., Taylor, R.N., Dourish, P., Redmiles, D. (2005). Towards An Architectural Treatment of Software Security: A Connector-Centric Approach. In proceedings of the Workshop on Software Engineering for Secure Systems, held in conjunction with the 27th International Conference on Software Engineering, (St. Louis, Missouri, USA, May 15-16).
  2. DePaula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D., Ren, J., Rode, J., and Silva Filho, R. (2005). Two Experiences Designing for Effective Security. In proceedings of the 2005 Symposium On Usable Privacy and Security (SOUPS 2005) (Pittsburgh, PA, July 6-8), 25-34.
  3. DiGioia, P. and Dourish, P. (2005). Social Navigation as a Model for Usable Security. In proceedings of the 2005 Symposium On Usable Privacy and Security (SOUPS 2005) (Pittsburgh, PA. July 6-8), 101-108.
  4. Anderson, K. and Dourish, P. (2005). Situated Privacies: Do you know where you mother [trucker] is? In proceedings of the 11th International Conference on Human-Computer Interaction. (Las Vegas, NV, July 22-27).
  5. Boehner, K., DePaula, R., Dourish, P., and Sengers, P. (2005). Affect: From Information to Interaction . In proceedings of Critical Computing: Fourth Decennial Aarhus Conference (Aarhus, Denmark, August 20-24), 59-68.
  6. Silva Filho R. S., Redmiles D. (2005). Striving for Versatility in Publish/Subscribe Infrastructures . In proceedings of the Fifth International Workshop on Software Engineering and Middleware (SEM'2005) -- In conjunction with the ACM ESEC/FSE Conference (Lisbon, Portugal. September 5-6), 17-24.
  7. Williams, A., Kabisch, E., and Dourish, P. (2005). From Interaction to Participation: Configuring Space through Embodied Interaction . In proceedings of the International Conference on Ubiquitous Computing (Ubicomp 2005) (Tokyo, Japan, September 11-14), 287-304.
  8. De Souza, C., Froehlich, J., and Dourish, P. (2005). Seeking the Source: Software Source Code as a Social and Technical Artifact . In proceedings of the ACM Conference on Supporting Group Work (GROUP 2005) (Sanibel Island, FL, November 6-9), 197-206.
  9. Rode, J., Johansson, C., DiGioia, P., Silva Filho, R., Nies, K., Nguyen, D.H., Ren, J., Dourish, P., and Redmiles, D. (2006). Seeing Further: Extending Visualization as a Basis for Usable Security. In proceedings of the 2006 Symposium On Usable Privacy and Security (SOUPS 2006) (Pittsburgh, PA, July 12-14), 145-155.
  10. Silva Filho and Redmiles, D. (2006). Extending Desktop Applications with Pocket-size Devices. Poster abstract. 2006 Symposium On Usable Privacy and Security (SOUPS 2006) (Pittsburgh, PA, July 12-14).
  11. DiGioia, P. and Dourish, P. (2006). Media Characterization for the Visualization of Secure Paths. Poster abstract. 2006 Symposium On Usable Privacy and Security (SOUPS 2006) (Pittsburgh, PA, July 12-14).

Other

  1. Johansson, C. (2006). Incorporating Social Navigation into a Usable Security System. Master’s Thesis, Uppsala University, June 2006.

Related Publications

  1. Dourish, P. and Redmiles, D. (2002). An Approach to Usable Security Based on Event Monitoring and Visualization . In proceedings of the New Security Paradigms Workshop 2002 (Virginia Beach, VA).
  2. Dourish, P. and Byttner, J. (2002). A Visual Virtual Machine for Java Programs: Exploration and Early Experiences . In proceedings of the ICDMS Workshop on Visual Computing (Redwood City, CA).
  3. Palen, L. and Dourish, P. (2003). Unpacking "Privacy" for a Networked World . In proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2003) (Fort Lauderdale, FL). New York: ACM.
  4. Silva Filho, R. S., de Souza, C.R.B., Redmiles, D.F. (2003). The Design of a Configurable, Extensible and Dynamic Notification Service . In proceedings of the Second International Workshop on Distributed Event-Based Systems (DEBS 2003), In conjunction with the ACM SIGMOD/PODS Conference (San Diego, CA, June 2003).
  5. Dourish, P. (2004). What We Talk About When We Talk About Context . Personal and Ubiquitous Computing, 8(1), 19-30.
  6. Fisher, D. and Dourish, P. (2004). Social and Temporal Structures in Everyday Collaboration . In proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2004) (Vienna, Austria), 551-558.
  7. Froehlich, J. and Dourish, P. (2004). Unifying Artifacts and Activities in a Visual Tool for Distributed Software Development Teams . In proceedings of the International Conference on Software Engineering (ICSE 2004) (Edinburgh, Scotland), 387-396.
  8. van der Hoek, A., Redmiles, D., Dourish, P., Sarma, A., Silva Filho, R., de Souza, C. (2004). Continuous Coordination: A New Paradigm for Collaborative Software Engineering Tools . Workshop on Directions in Software Engineering Environments (WoDiSEE 2004), held in conjunction with the 26th International Conference on Software Engineering (ICSE 2004) (Edinburgh, Scotland).
  9. Naslavsky, L., Silva Filho, R.S., de Souza, C.R.B., Dias, M., Richardson, D., Redmiles, D. (2004). Distributed Expectation-Driven Residual Testing . Second International Workshop on Remote Analysis and Measurement of Software Systems (RAMSS 04), held in conjunction with the 26th International Conference on Software Engineering (ICSE 2004) (Edinburgh, Scotland).
  10. Barkhuus, L. and Dourish, P. (2004). Everyday Encounters with Ubiquitous Computing in a Campus Environment . In proceedings of the Sixth International Conference on Ubiquitous Computing (Ubicomp 2004) (Nottingham, UK) , 232-249.
  11. Dourish, P., Grinter, R., Delgado de la Flor, J., and Joseph, M. (2004). Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem . Personal and Ubiquitous Computing, 8(6): 391-401.
  12. Silva Filho, R.S., de Souza, C.R.B., Redmiles, D. (2004). Design and Experiments with YANCEES, a Versatile Publish-Subscribe Service . Technical Report UCI-ISR-04-1, Institute for Software Research, University of California, Irvine, CA.
  13. Silva Filho, R.S., Redmiles, D.F. (2004). Preserving Versatility in Event-Based Middleware, Technical Report UCI-ISR-04-7, Institute for Software Research, University of California, Irvine, CA.