{"title":"Making sense of sensors: mobile sensor security awareness and education","authors":"M. Mehrnezhad, Ehsan Toreini, Sami Alajrami","doi":"10.1145/3167996.3168001","DOIUrl":"https://doi.org/10.1145/3167996.3168001","url":null,"abstract":"Mobile sensors have already proved to be helpful to different aspects of people's everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors provides a malicious program running with an exploit path. While the users are benefiting from richer and more personalized apps, the growing number of sensors introduces new security and privacy risks to end users, and makes the task of sensor management more complex.\u0000 In this paper, first, we discuss the issues around security and privacy of mobile sensors. Second, we reflect the results of a workshop which we organized on mobile sensor security. In this workshop, the participants are introduced to mobile sensors by working with sensor-enabled apps. We evaluate the risk levels perceived by the participants for these sensors after they learn their functionalities. The results show that knowing sensors by working with sensor-enabled apps would not immediately improve the users' security inference of the actual risks of these sensors. Finally, we provide recommendations for educators, app developers, and mobile users to contribute toward awareness and education on this topic.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134503564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Addressing misconceptions about password security effectively","authors":"Peter Mayer, M. Volkamer","doi":"10.1145/3167996.3167998","DOIUrl":"https://doi.org/10.1145/3167996.3167998","url":null,"abstract":"Nowadays, most users need more passwords than they can handle. Consequently, users have developed a multitude of strategies to cope with this situation. Some of these coping strategies are based on misconceptions about password security. In such cases, the users are unaware of their insecure password practices. Addressing the misconceptions is vital in order to decrease insecure coping strategies. We conducted a systematic literature review with the goal to provide an overview of the misconceptions about password security. Our literature review revealed that misconceptions exist in basically all aspects of password security. Furthermore, we developed interventions to address these misconceptions. Then, we evaluated the interventions' effectiveness in decreasing the misconceptions at three small and medium sized enterprises (SME). Our results show that the interventions decrease the overall prevalence of misconceptions significantly in the participating employees.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130789000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Gerber, Paul Gerber, Hannah Drews, E. Kirchner, N. Schlegel, Tim Schmidt, Lena Scholz
{"title":"FoxIT: enhancing mobile users' privacy behavior by increasing knowledge and awareness","authors":"N. Gerber, Paul Gerber, Hannah Drews, E. Kirchner, N. Schlegel, Tim Schmidt, Lena Scholz","doi":"10.1145/3167996.3167999","DOIUrl":"https://doi.org/10.1145/3167996.3167999","url":null,"abstract":"Albeit offering many benefits, smartphones can pose a severe privacy threat to users. While some users might simply be not aware of privacy issues, others are highly motivated to protect their data, but lack the ability and knowledge to do so. We developed an Android-based application called \"FoxIT\", which provides users with several education modules as well as a static smartphone and app permission analysis to increase both, privacy awareness and knowledge of mobile users. We conducted a first evaluation of FoxIT in a two-week field study with 31 users and were able to show that use of FoxIT not only leads to increased privacy awareness, but also improves knowledge about privacy related topics. Participants also reported to have improved the privacy conditions on their smartphone, actively informed themselves about privacy related topics, and prompted others to protect their data after using FoxIT. Our results indicate that it might be a promising approach to improve mobile users' privacy behavior by raising awareness and providing background information about privacy related topics.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132156880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Ever Changing Threat Model: A Social-Technical Perspective","authors":"J. E. Martina","doi":"10.1109/STAST.2013.16","DOIUrl":"https://doi.org/10.1109/STAST.2013.16","url":null,"abstract":"Summary form only given. Since Needham and Schroeder introduced the idea of an active attacker, a lot of research has been made on the technical side of information security in order to verify the protocols' claims against this type of attacker. Nowadays, the Dolev-Yao threat model is the most widely accepted attacker model for that. Consequently, we tend to consider systems when secure against an attacker under Dolev-Yao's assumptions. With the introduction of the human-centric security ideas we include human peers in our designs. With this addition we can potentially find and solve security flaws that were previously not detectable.In this talk, we will discuss that even though Dolev-Yao's threat model can represent the most powerful attacker possible, the attacker in this model is not realistic in certain scenarios, especially those related to the human peers. We look over other variations of threat models, including a dynamic threat model that can be adjusted according to each social-technical context. These new perspectives will help us to model and analyse security requirements in human-computer interaction always regarding to realistic scenarios without degrading security and improving usability.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130351765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Governing Public Decentralised Systems - Work in Progress","authors":"Moritz Platt, P. McBurney","doi":"10.1007/978-3-030-79318-0_9","DOIUrl":"https://doi.org/10.1007/978-3-030-79318-0_9","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115428468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gianpiero Costantino, F. Martinelli, I. Matteucci, P. Santi
{"title":"A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services","authors":"Gianpiero Costantino, F. Martinelli, I. Matteucci, P. Santi","doi":"10.1007/978-3-030-55958-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_9","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Work in Progress: Can Johnny Encrypt E-Mails on Smartphones?","authors":"K. Schiller, Florian Adamsky","doi":"10.1007/978-3-031-10183-0_9","DOIUrl":"https://doi.org/10.1007/978-3-031-10183-0_9","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124978979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours","authors":"S. Parkin, Y. Chua","doi":"10.1007/978-3-030-79318-0_2","DOIUrl":"https://doi.org/10.1007/978-3-030-79318-0_2","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129111368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Which Properties Has an Icon? A Critical Discussion on Data Protection Iconography","authors":"Arianna Rossi, G. Lenzini","doi":"10.1007/978-3-030-55958-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_12","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130194881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Work in Progress: Towards Usable Updates for Smart Home Devices","authors":"Julie M. Haney, S. Furman","doi":"10.1007/978-3-030-79318-0_6","DOIUrl":"https://doi.org/10.1007/978-3-030-79318-0_6","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}