Workshop on Socio-Technical Aspects in Security and Trust最新文献

筛选
英文 中文
Statistical Reliability of 10 Years of Cyber Security User Studies (Extended Version) 10年网络安全用户研究的统计可靠性(扩展版)
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2020-10-05 DOI: 10.1007/978-3-030-79318-0_10
Thomas Gross
{"title":"Statistical Reliability of 10 Years of Cyber Security User Studies (Extended Version)","authors":"Thomas Gross","doi":"10.1007/978-3-030-79318-0_10","DOIUrl":"https://doi.org/10.1007/978-3-030-79318-0_10","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132712599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Natural Strategic Abilities in Voting Protocols 投票协议中的自然策略能力
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2020-07-24 DOI: 10.1007/978-3-030-79318-0_3
W. Jamroga, Damian Kurpiewski, Vadim Malvone
{"title":"Natural Strategic Abilities in Voting Protocols","authors":"W. Jamroga, Damian Kurpiewski, Vadim Malvone","doi":"10.1007/978-3-030-79318-0_3","DOIUrl":"https://doi.org/10.1007/978-3-030-79318-0_3","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128171138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies 网络安全用户研究十年统计报告的保真度
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2020-04-14 DOI: 10.1007/978-3-030-55958-8_1
Thomas Gross
{"title":"Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies","authors":"Thomas Gross","doi":"10.1007/978-3-030-55958-8_1","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_1","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131655338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Moving to Client-Side Hashing for Online Authentication 转向在线身份验证的客户端散列
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2019-09-26 DOI: 10.1007/978-3-030-55958-8_8
Enka Blanchard, Xavier Coquand, T. Selker
{"title":"Moving to Client-Side Hashing for Online Authentication","authors":"Enka Blanchard, Xavier Coquand, T. Selker","doi":"10.1007/978-3-030-55958-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_8","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114151139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies 案例研究:隐私政策中间接设备指纹的披露
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2019-08-21 DOI: 10.1007/978-3-030-55958-8_10
Julissa Milligan, Sarah Scheffler, A. Sellars, Trishita Tiwari, A. Trachtenberg, Mayank Varia
{"title":"Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies","authors":"Julissa Milligan, Sarah Scheffler, A. Sellars, Trishita Tiwari, A. Trachtenberg, Mayank Varia","doi":"10.1007/978-3-030-55958-8_10","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_10","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126217725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data, Data, Everywhere: Quantifying Software Developers' Privacy Attitudes 数据,数据,无处不在:量化软件开发人员的隐私态度
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2019-08-10 DOI: 10.1007/978-3-030-55958-8_3
D. Linden, I. Hadar, M. Edwards, A. Rashid
{"title":"Data, Data, Everywhere: Quantifying Software Developers' Privacy Attitudes","authors":"D. Linden, I. Hadar, M. Edwards, A. Rashid","doi":"10.1007/978-3-030-55958-8_3","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_3","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126076233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Work in progress: Fearful users' privacy intentions: an empirical investigation 正在进行的工作:害怕用户的隐私意图:一项实证调查
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2018-12-05 DOI: 10.1145/3167996.3168004
Kovila P. L. Coopamootoo
{"title":"Work in progress: Fearful users' privacy intentions: an empirical investigation","authors":"Kovila P. L. Coopamootoo","doi":"10.1145/3167996.3168004","DOIUrl":"https://doi.org/10.1145/3167996.3168004","url":null,"abstract":"Background. While recent research has found that the affect dimension of privacy attitude is fear focused [14], fear is known in psychology literature to be asymmetric to one's self-efficacy [5], that is one's belief in successfully solving a problem. Therefore the question arises how a user feeling fear or one warned about privacy, intends to act. In particular whether the user intends to take protective or defensive action.\u0000 Aim. We investigate the relationship between incidental affect state of [fear/ happiness], self-efficacy and privacy intention.\u0000 Method. We conduct an observational Study 1, with N = 175 and an experimental Study 2, with N = 200. In both studies, we measure general self-efficacy, affect state and privacy intentions. In Study 2, we induce affect states of [fear/happiness] via autobiographical recall of emotive events and a 150-word free-form report.\u0000 Results. A meta-analysis of correlation across both studies shows a negative correlation between Fear and Self-Efficacy. Fear is also negatively correlated to information disclosure, protection and refusal to transact intentions. We found a good fit for the data in a structural equation model, with causal links from Fear/Happiness to Self-Efficacy and from Self-Efficacy to protection intention.\u0000 Conclusions. This research is novel in measuring fear together with self-efficacy and privacy intentions. The findings suggest that while the fearful user has a not-disclosing intention, in parallel, he also does not have a protection intention. While this research contributes to understanding the privacy paradox, it also suggests that a culture of fear online is not conducive to users actively protecting their privacy. In fact fear can lead to user dis-empowerment because of its influence on self-efficacy. These initial findings supports our larger research vision for deeper investigation of human affect in cyber security and privacy [11].","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A child recognition system based on image selection patterns 基于图像选择模式的儿童识别系统
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2018-12-05 DOI: 10.1145/3167996.3168003
Mahshid Mehr Nezhad, M. Mehrnezhad
{"title":"A child recognition system based on image selection patterns","authors":"Mahshid Mehr Nezhad, M. Mehrnezhad","doi":"10.1145/3167996.3168003","DOIUrl":"https://doi.org/10.1145/3167996.3168003","url":null,"abstract":"In recent years, a market of games and learning websites and apps for children has grown everywhere in the world. With the increasing development of online services on various devices such as PCs, smartphones and tablets, it is important to recognize kids across the web. This is not only required to provide them with more effective services e.g. for education purposes, but also to prevent them from having access to certain content e.g. violent or sexual films. This paper presents our ongoing effort in developing a child recognition system based on the patterns users produce when clicking a set of pictures. We propose a system where users are presented with a set of images chosen from two different pre-prepared categories: children and non-children (adults). The users can click on any of these pictures without any specific rules for this selection process. We implement a web-based prototype of our system and test it with 120 different users (60 adults, and 60 children). The initial results show that children have different image selection patterns compared to adults which enable us to tell them apart from each other.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"116 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134581457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a comprehensive analytical framework for smart toy privacy practices 为智能玩具隐私实践建立一个全面的分析框架
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2018-12-05 DOI: 10.1145/3167996.3168002
Moustafa Mahmoud, Md Zakir Hossen, Hesham Barakat, Mohammad Mannan, A. Youssef
{"title":"Towards a comprehensive analytical framework for smart toy privacy practices","authors":"Moustafa Mahmoud, Md Zakir Hossen, Hesham Barakat, Mohammad Mannan, A. Youssef","doi":"10.1145/3167996.3168002","DOIUrl":"https://doi.org/10.1145/3167996.3168002","url":null,"abstract":"Smart toys are becoming increasingly popular with children and parents alike, primarily due to the toys' dynamic nature, superior-interactivity, and apparent educational value. However, as these toys may be Internet-connected, and equipped with various sensors that can record children's everyday interactions, they can pose serious security and privacy threats to children. Indeed, in the recent years, several smart toys have been reported to be vulnerable, and some associated companies also have suffered large-scale data breaches, exposing information collected through these toys. To complement recent efforts in analyzing and quantifying security of smart toys, in this work, we propose a comprehensive analytical framework based on 17 privacy-sensitive criteria to systematically evaluate selected privacy aspects of smart toys. Our work is primarily based on publicly available (legally-binding) privacy policies and terms of use documentation, and a static analysis of companion Android apps, which are, in most cases, essential for intended functioning of the toys. We use our framework to evaluate a representative set of 11 smart toys. Our analysis highlights incomplete/lack of information about data storage practices and legal compliance, and several instances of unnecessary collection of privacy-sensitive information, and the use of over-privileged apps. The proposed framework is a step towards comparing smart toys from a privacy perspective, which can be useful to toy manufacturers, parents, regulatory bodies, and law-makers.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127693775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A qualitative study on usability and acceptability of Yubico security key Yubico安全密钥可用性和可接受性的定性研究
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2018-12-05 DOI: 10.1145/3167996.3167997
Sanchari Das, Gianpaolo Russo, Andrew Dingman, Jayati Dev, O. Kenny, L. Camp
{"title":"A qualitative study on usability and acceptability of Yubico security key","authors":"Sanchari Das, Gianpaolo Russo, Andrew Dingman, Jayati Dev, O. Kenny, L. Camp","doi":"10.1145/3167996.3167997","DOIUrl":"https://doi.org/10.1145/3167996.3167997","url":null,"abstract":"Individual concerns about account takeover and subversion are well-documented. Surveys indicate that concerns for the privacy and security of online accounts are widely shared. Adopting Two-Factor Authentication (2FA) is an action that individuals can take to secure their own accounts, including many popular consumer-facing services. Given that, why is two-factor hardware not more widely adopted? What usability and acceptability factors drive the adoption, or lack of adoption of 2FA in the form of trusted hardware? Passwords are inherently misaligned with human cognition, and hardware keys designed for ease of use are readily available in the marketplace. Yet passwords remain the dominant online authentication method. In order to better understand relevant issues driving or impinging adoption of Two-Factor Authentication, we implemented a two-phase study of the Yubico FIDO U2F security key.\u0000 The Yubico security key is a 2FA device designed to be user friendly. We examined the usability of the device by implementing a think-aloud protocol, and documented the halt and confusion points. We provided this analysis to Yubico, who implemented many of the recommended changes. We then repeated the study in the same context; noting significant improvements in usability. However, increase in usability did not affect the acceptability of the device, affecting the prolonged usage of the device. In both phases we interviewed the study participants about the acceptability of the device, finding similar concerns about lack of benefits and the invisibility of risk. A source of opposition to adoption is the concern for loss of access, with participants prioritizing availability over confidentiality. Another concern is that these do not lessen or simplify interaction with services as passwords are still required. We close with open questions for additional research, and further recommendations to encourage online safety through the adoption of 2FA.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信