{"title":"Statistical Reliability of 10 Years of Cyber Security User Studies (Extended Version)","authors":"Thomas Gross","doi":"10.1007/978-3-030-79318-0_10","DOIUrl":"https://doi.org/10.1007/978-3-030-79318-0_10","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132712599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Natural Strategic Abilities in Voting Protocols","authors":"W. Jamroga, Damian Kurpiewski, Vadim Malvone","doi":"10.1007/978-3-030-79318-0_3","DOIUrl":"https://doi.org/10.1007/978-3-030-79318-0_3","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128171138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies","authors":"Thomas Gross","doi":"10.1007/978-3-030-55958-8_1","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_1","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131655338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Moving to Client-Side Hashing for Online Authentication","authors":"Enka Blanchard, Xavier Coquand, T. Selker","doi":"10.1007/978-3-030-55958-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_8","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114151139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Julissa Milligan, Sarah Scheffler, A. Sellars, Trishita Tiwari, A. Trachtenberg, Mayank Varia
{"title":"Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies","authors":"Julissa Milligan, Sarah Scheffler, A. Sellars, Trishita Tiwari, A. Trachtenberg, Mayank Varia","doi":"10.1007/978-3-030-55958-8_10","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_10","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126217725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data, Data, Everywhere: Quantifying Software Developers' Privacy Attitudes","authors":"D. Linden, I. Hadar, M. Edwards, A. Rashid","doi":"10.1007/978-3-030-55958-8_3","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_3","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126076233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Work in progress: Fearful users' privacy intentions: an empirical investigation","authors":"Kovila P. L. Coopamootoo","doi":"10.1145/3167996.3168004","DOIUrl":"https://doi.org/10.1145/3167996.3168004","url":null,"abstract":"Background. While recent research has found that the affect dimension of privacy attitude is fear focused [14], fear is known in psychology literature to be asymmetric to one's self-efficacy [5], that is one's belief in successfully solving a problem. Therefore the question arises how a user feeling fear or one warned about privacy, intends to act. In particular whether the user intends to take protective or defensive action.\u0000 Aim. We investigate the relationship between incidental affect state of [fear/ happiness], self-efficacy and privacy intention.\u0000 Method. We conduct an observational Study 1, with N = 175 and an experimental Study 2, with N = 200. In both studies, we measure general self-efficacy, affect state and privacy intentions. In Study 2, we induce affect states of [fear/happiness] via autobiographical recall of emotive events and a 150-word free-form report.\u0000 Results. A meta-analysis of correlation across both studies shows a negative correlation between Fear and Self-Efficacy. Fear is also negatively correlated to information disclosure, protection and refusal to transact intentions. We found a good fit for the data in a structural equation model, with causal links from Fear/Happiness to Self-Efficacy and from Self-Efficacy to protection intention.\u0000 Conclusions. This research is novel in measuring fear together with self-efficacy and privacy intentions. The findings suggest that while the fearful user has a not-disclosing intention, in parallel, he also does not have a protection intention. While this research contributes to understanding the privacy paradox, it also suggests that a culture of fear online is not conducive to users actively protecting their privacy. In fact fear can lead to user dis-empowerment because of its influence on self-efficacy. These initial findings supports our larger research vision for deeper investigation of human affect in cyber security and privacy [11].","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A child recognition system based on image selection patterns","authors":"Mahshid Mehr Nezhad, M. Mehrnezhad","doi":"10.1145/3167996.3168003","DOIUrl":"https://doi.org/10.1145/3167996.3168003","url":null,"abstract":"In recent years, a market of games and learning websites and apps for children has grown everywhere in the world. With the increasing development of online services on various devices such as PCs, smartphones and tablets, it is important to recognize kids across the web. This is not only required to provide them with more effective services e.g. for education purposes, but also to prevent them from having access to certain content e.g. violent or sexual films. This paper presents our ongoing effort in developing a child recognition system based on the patterns users produce when clicking a set of pictures. We propose a system where users are presented with a set of images chosen from two different pre-prepared categories: children and non-children (adults). The users can click on any of these pictures without any specific rules for this selection process. We implement a web-based prototype of our system and test it with 120 different users (60 adults, and 60 children). The initial results show that children have different image selection patterns compared to adults which enable us to tell them apart from each other.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"116 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134581457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moustafa Mahmoud, Md Zakir Hossen, Hesham Barakat, Mohammad Mannan, A. Youssef
{"title":"Towards a comprehensive analytical framework for smart toy privacy practices","authors":"Moustafa Mahmoud, Md Zakir Hossen, Hesham Barakat, Mohammad Mannan, A. Youssef","doi":"10.1145/3167996.3168002","DOIUrl":"https://doi.org/10.1145/3167996.3168002","url":null,"abstract":"Smart toys are becoming increasingly popular with children and parents alike, primarily due to the toys' dynamic nature, superior-interactivity, and apparent educational value. However, as these toys may be Internet-connected, and equipped with various sensors that can record children's everyday interactions, they can pose serious security and privacy threats to children. Indeed, in the recent years, several smart toys have been reported to be vulnerable, and some associated companies also have suffered large-scale data breaches, exposing information collected through these toys. To complement recent efforts in analyzing and quantifying security of smart toys, in this work, we propose a comprehensive analytical framework based on 17 privacy-sensitive criteria to systematically evaluate selected privacy aspects of smart toys. Our work is primarily based on publicly available (legally-binding) privacy policies and terms of use documentation, and a static analysis of companion Android apps, which are, in most cases, essential for intended functioning of the toys. We use our framework to evaluate a representative set of 11 smart toys. Our analysis highlights incomplete/lack of information about data storage practices and legal compliance, and several instances of unnecessary collection of privacy-sensitive information, and the use of over-privileged apps. The proposed framework is a step towards comparing smart toys from a privacy perspective, which can be useful to toy manufacturers, parents, regulatory bodies, and law-makers.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127693775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanchari Das, Gianpaolo Russo, Andrew Dingman, Jayati Dev, O. Kenny, L. Camp
{"title":"A qualitative study on usability and acceptability of Yubico security key","authors":"Sanchari Das, Gianpaolo Russo, Andrew Dingman, Jayati Dev, O. Kenny, L. Camp","doi":"10.1145/3167996.3167997","DOIUrl":"https://doi.org/10.1145/3167996.3167997","url":null,"abstract":"Individual concerns about account takeover and subversion are well-documented. Surveys indicate that concerns for the privacy and security of online accounts are widely shared. Adopting Two-Factor Authentication (2FA) is an action that individuals can take to secure their own accounts, including many popular consumer-facing services. Given that, why is two-factor hardware not more widely adopted? What usability and acceptability factors drive the adoption, or lack of adoption of 2FA in the form of trusted hardware? Passwords are inherently misaligned with human cognition, and hardware keys designed for ease of use are readily available in the marketplace. Yet passwords remain the dominant online authentication method. In order to better understand relevant issues driving or impinging adoption of Two-Factor Authentication, we implemented a two-phase study of the Yubico FIDO U2F security key.\u0000 The Yubico security key is a 2FA device designed to be user friendly. We examined the usability of the device by implementing a think-aloud protocol, and documented the halt and confusion points. We provided this analysis to Yubico, who implemented many of the recommended changes. We then repeated the study in the same context; noting significant improvements in usability. However, increase in usability did not affect the acceptability of the device, affecting the prolonged usage of the device. In both phases we interviewed the study participants about the acceptability of the device, finding similar concerns about lack of benefits and the invisibility of risk. A source of opposition to adoption is the concern for loss of access, with participants prioritizing availability over confidentiality. Another concern is that these do not lessen or simplify interaction with services as passwords are still required. We close with open questions for additional research, and further recommendations to encourage online safety through the adoption of 2FA.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}