Proceedings of the Second Workshop on Situating Network Infrastructure with People, Practices, and Beyond最新文献

筛选
英文 中文
What's my Daily Value? Interpretation of network performance metrics in broadband consumer labels 我的每日摄入量是多少?宽带消费者标签中网络性能指标的解释
Wesley Woo, Shaddi Hasan
{"title":"What's my Daily Value? Interpretation of network performance metrics in broadband consumer labels","authors":"Wesley Woo, Shaddi Hasan","doi":"10.1145/3609396.3610546","DOIUrl":"https://doi.org/10.1145/3609396.3610546","url":null,"abstract":"Despite the importance of residential Internet, choosing Internet plans is often an opaque and frustrating process for consumers. To address this, United States regulatory authorities have proposed \"broadband consumer labels\", akin to nutrition labels, to improve transparency and empower consumers to make informed decisions, but to achieve their goal, such labels must both capture information relevant to consumers while being interpretable. In this paper, we present the results of a qualitative interview study with Internet consumers in rural/suburban communities in the Appalachian region of the United States. We find that network metrics typically used to characterize Internet service plans in proposed broadband labels, such as speeds and latency, are difficult to interpret and do not capture valued attributes of Internet service such as reliability. As a result, consumers to adopt a variety of social strategies to map their perceived needs to advertised offerings. We conclude with implications for proposed broadband consumer labels.","PeriodicalId":254649,"journal":{"name":"Proceedings of the Second Workshop on Situating Network Infrastructure with People, Practices, and Beyond","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133709367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeTagTive: Linking MACs to Protect Against Malicious BLE Trackers DeTagTive:连接mac以防止恶意BLE跟踪器
Tess Despres, Noelle Davis, P. Dutta, D. Wagner
{"title":"DeTagTive: Linking MACs to Protect Against Malicious BLE Trackers","authors":"Tess Despres, Noelle Davis, P. Dutta, D. Wagner","doi":"10.1145/3609396.3610544","DOIUrl":"https://doi.org/10.1145/3609396.3610544","url":null,"abstract":"Bluetooth Low Energy (BLE) location trackers are popular and useful for finding misplaced keys, devices, and other items. However, they can also be used to track people and enable abuse. The companies that make location trackers, such as Apple, have worked to address these issues by adding notifications within their ecosystem and publishing recommendations for other manufacturers, creating a vertically integrated solution. More generally, however, BLE devices which rotate their MAC addresses remain elusive to responsible detection within and across many manufacturer platforms. Rotation of MAC addresses is crucial in some non-malicious usage scenarios for the privacy of the device owner, but this feature also makes detection more difficult. In this work, we propose and evaluate a detection algorithm that is robust to rotating MAC addresses by using parameters that appear to offer implicit continuity, including signal strength and advertisement intervals. A preliminary test of our algorithm, on four common BLE trackers and across multiple scenarios, shows this approach to be promising and practical.","PeriodicalId":254649,"journal":{"name":"Proceedings of the Second Workshop on Situating Network Infrastructure with People, Practices, and Beyond","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116555120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stories from the Field (of Networking): Lessons from Deploying Research Systems in the Real World. (网络)领域的故事:在现实世界中部署研究系统的经验教训。
Kurtis Heimerl, E. Jang, I. Ndubuisi-Obi
{"title":"Stories from the Field (of Networking): Lessons from Deploying Research Systems in the Real World.","authors":"Kurtis Heimerl, E. Jang, I. Ndubuisi-Obi","doi":"10.1145/3609396.3610547","DOIUrl":"https://doi.org/10.1145/3609396.3610547","url":null,"abstract":"As computer science has grown in importance throughout the world, there's been a similarly growing drive to apply foundational computer science to address core societal issues. For networking researchers, this effort has largely focused on bringing the benefits of Internet access to marginalized populations. In this work, we reflect on more than a decade of our own work deploying such research into the world in all of rural, urban, developed, and developing regions. We share key lessons and related stories that have influenced they way we do this type of work. We conclude with a call to other researchers to add their own stories to share back to the wider networking research community.","PeriodicalId":254649,"journal":{"name":"Proceedings of the Second Workshop on Situating Network Infrastructure with People, Practices, and Beyond","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133526901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the Second Workshop on Situating Network Infrastructure with People, Practices, and Beyond 第二届网络基础设施与人,实践和超越研讨会论文集
{"title":"Proceedings of the Second Workshop on Situating Network Infrastructure with People, Practices, and Beyond","authors":"","doi":"10.1145/3609396","DOIUrl":"https://doi.org/10.1145/3609396","url":null,"abstract":"","PeriodicalId":254649,"journal":{"name":"Proceedings of the Second Workshop on Situating Network Infrastructure with People, Practices, and Beyond","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116862027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信