2. Hello!
I am Mel Savich
I am the Cybersecurity Lead.
You can find me at:
@melaleucaaa
3. Hello!
I am Erica Sietsema
I am the Director of Research and
Development.
You can find me at:
secureIoT@umich.edu
4. Hello!
I am Kiley Judge
I am the User Interface Designer.
You can find me at:
kajudge@umich.edu
5. Security is hard; it's nearly impossible to
know what devices are connected to
your home network.. and extremely
difficult to decide what to do if someone
is on your network.
7. Becca Davis
Becca is a 22 year-old Political Science
student at Indiana University.
In her free time, she games a lot online. But
recently she’s noticed that her internet
experience has been lagging.
After calling her ISP and doing some
Googling, she found out that there was more
internet activity on her network than
expected for a 3-person apartment.
This led Becca to believe that there were
people connected to her internet without her
or her roommate’s knowledge.
8. Becca lives in a small college apartment
with multiple other roommates. Her wifi
password is constantly being shared
and she currently has no way of
knowing what is connected to her
network.
9. Persona: Think/See/Feel/Do
secureIoT
Think
Becca thinks that her wifi is too slow and wants
to know why.
See
She sees that her roommate gives out the
apartment’s wifi password constantly.
Feel
She feels that there should be a way to control
who is on her network.
Do Becca is forced to game in other locations.
10. Use Case
As a student who shares wifi
with my roommates,
I want to monitor my network
so that my internet does not lag.
12. ➜ we believe that users of our
application aren’t knowledgeable in
security, but would like to be
➜ we hope to learn whether users
would use secureIoT often in their
everyday lives
➜ this information would be valuable
to security usability research
Hypothesis