{"id":100,"date":"2005-07-08T18:48:53","date_gmt":"2005-07-08T18:48:53","guid":{"rendered":"\/?p=100"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T04:00:00","slug":"tune-in-to-usable-security","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=100","title":{"rendered":"Tune in to Usable Security"},"content":{"rendered":"<p>Thanks to Caspar Bowden for telling us about <a href=\"http:\/\/usablesecurity.com\/\" class=\"broken_link\">Usable Security<\/a>, a site which is absolutely fascinating and which concentrates on issues related to the sixth law of identity &#8211; the human as a part of the identity metasystem.<\/p>\n<p>As if this site were not enough of a treat already, it contains a link to a paper called <a href=\"http:\/\/www.cs.kau.se\/~simone\/PRIMEforSOUPS.pdf\" class=\"broken_link\">Making Prime Usable<\/a> (this now works again &#8211; Kim).  Prime is a european privacy initiative that brings together a number of important researchers.  <\/p>\n<p>The paper deals with many of the visualization and user experience issues we have encountered during our development of the InfoCard, so I&#39;m reading it with great interest.  Authors are John S&ouml;ren Pettersson, Simone Fischer-H&uuml;bner, Ninni Danielsson and Jenny Nilsson from Karlstad University in Sweden; Mike Bergmann, Sebastian Clauss and Thomas Kriegelstein from TU Dresden; and Henry Krasemann from the Independent Centre for Privacy Protection (ICPP) in Germany.<\/p>\n<p>People who care about the sixth law will find this irresistable.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thanks to Caspar Bowden for telling us about Usable Security, a site which is absolutely fascinating and which concentrates on issues related to the sixth law of identity &#8211; the human as a part of the identity metasystem. As if this site were not enough of a treat already, it contains a link to a &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=100\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Tune in to Usable Security<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/100"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=100"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/100\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}