Workshop on Socio-Technical Aspects in Security and Trust最新文献

筛选
英文 中文
Making sense of sensors: mobile sensor security awareness and education 传感器的意义:移动传感器的安全意识和教育
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2018-12-05 DOI: 10.1145/3167996.3168001
M. Mehrnezhad, Ehsan Toreini, Sami Alajrami
{"title":"Making sense of sensors: mobile sensor security awareness and education","authors":"M. Mehrnezhad, Ehsan Toreini, Sami Alajrami","doi":"10.1145/3167996.3168001","DOIUrl":"https://doi.org/10.1145/3167996.3168001","url":null,"abstract":"Mobile sensors have already proved to be helpful to different aspects of people's everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors provides a malicious program running with an exploit path. While the users are benefiting from richer and more personalized apps, the growing number of sensors introduces new security and privacy risks to end users, and makes the task of sensor management more complex.\u0000 In this paper, first, we discuss the issues around security and privacy of mobile sensors. Second, we reflect the results of a workshop which we organized on mobile sensor security. In this workshop, the participants are introduced to mobile sensors by working with sensor-enabled apps. We evaluate the risk levels perceived by the participants for these sensors after they learn their functionalities. The results show that knowing sensors by working with sensor-enabled apps would not immediately improve the users' security inference of the actual risks of these sensors. Finally, we provide recommendations for educators, app developers, and mobile users to contribute toward awareness and education on this topic.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134503564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Addressing misconceptions about password security effectively 有效解决有关密码安全的误解
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2018-12-05 DOI: 10.1145/3167996.3167998
Peter Mayer, M. Volkamer
{"title":"Addressing misconceptions about password security effectively","authors":"Peter Mayer, M. Volkamer","doi":"10.1145/3167996.3167998","DOIUrl":"https://doi.org/10.1145/3167996.3167998","url":null,"abstract":"Nowadays, most users need more passwords than they can handle. Consequently, users have developed a multitude of strategies to cope with this situation. Some of these coping strategies are based on misconceptions about password security. In such cases, the users are unaware of their insecure password practices. Addressing the misconceptions is vital in order to decrease insecure coping strategies. We conducted a systematic literature review with the goal to provide an overview of the misconceptions about password security. Our literature review revealed that misconceptions exist in basically all aspects of password security. Furthermore, we developed interventions to address these misconceptions. Then, we evaluated the interventions' effectiveness in decreasing the misconceptions at three small and medium sized enterprises (SME). Our results show that the interventions decrease the overall prevalence of misconceptions significantly in the participating employees.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130789000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
FoxIT: enhancing mobile users' privacy behavior by increasing knowledge and awareness 福讯科技:通过提高手机用户的隐私知识和意识,增强手机用户的隐私行为
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2017-12-01 DOI: 10.1145/3167996.3167999
N. Gerber, Paul Gerber, Hannah Drews, E. Kirchner, N. Schlegel, Tim Schmidt, Lena Scholz
{"title":"FoxIT: enhancing mobile users' privacy behavior by increasing knowledge and awareness","authors":"N. Gerber, Paul Gerber, Hannah Drews, E. Kirchner, N. Schlegel, Tim Schmidt, Lena Scholz","doi":"10.1145/3167996.3167999","DOIUrl":"https://doi.org/10.1145/3167996.3167999","url":null,"abstract":"Albeit offering many benefits, smartphones can pose a severe privacy threat to users. While some users might simply be not aware of privacy issues, others are highly motivated to protect their data, but lack the ability and knowledge to do so. We developed an Android-based application called \"FoxIT\", which provides users with several education modules as well as a static smartphone and app permission analysis to increase both, privacy awareness and knowledge of mobile users. We conducted a first evaluation of FoxIT in a two-week field study with 31 users and were able to show that use of FoxIT not only leads to increased privacy awareness, but also improves knowledge about privacy related topics. Participants also reported to have improved the privacy conditions on their smartphone, actively informed themselves about privacy related topics, and prompted others to protect their data after using FoxIT. Our results indicate that it might be a promising approach to improve mobile users' privacy behavior by raising awareness and providing background information about privacy related topics.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132156880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The Ever Changing Threat Model: A Social-Technical Perspective 不断变化的威胁模型:社会-技术视角
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 2013-06-29 DOI: 10.1109/STAST.2013.16
J. E. Martina
{"title":"The Ever Changing Threat Model: A Social-Technical Perspective","authors":"J. E. Martina","doi":"10.1109/STAST.2013.16","DOIUrl":"https://doi.org/10.1109/STAST.2013.16","url":null,"abstract":"Summary form only given. Since Needham and Schroeder introduced the idea of an active attacker, a lot of research has been made on the technical side of information security in order to verify the protocols' claims against this type of attacker. Nowadays, the Dolev-Yao threat model is the most widely accepted attacker model for that. Consequently, we tend to consider systems when secure against an attacker under Dolev-Yao's assumptions. With the introduction of the human-centric security ideas we include human peers in our designs. With this addition we can potentially find and solve security flaws that were previously not detectable.In this talk, we will discuss that even though Dolev-Yao's threat model can represent the most powerful attacker possible, the attacker in this model is not realistic in certain scenarios, especially those related to the human peers. We look over other variations of threat models, including a dynamic threat model that can be adjusted according to each social-technical context. These new perspectives will help us to model and analyse security requirements in human-computer interaction always regarding to realistic scenarios without degrading security and improving usability.","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130351765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Governing Public Decentralised Systems - Work in Progress 自治的公共去中心化系统——正在进行的工作
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-79318-0_9
Moritz Platt, P. McBurney
{"title":"Self-Governing Public Decentralised Systems - Work in Progress","authors":"Moritz Platt, P. McBurney","doi":"10.1007/978-3-030-79318-0_9","DOIUrl":"https://doi.org/10.1007/978-3-030-79318-0_9","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115428468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services 基于驾驶员声誉感知的汽车服务隐私保护基础设施
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-55958-8_9
Gianpiero Costantino, F. Martinelli, I. Matteucci, P. Santi
{"title":"A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services","authors":"Gianpiero Costantino, F. Martinelli, I. Matteucci, P. Santi","doi":"10.1007/978-3-030-55958-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_9","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Work in Progress: Can Johnny Encrypt E-Mails on Smartphones? 正在进行的工作:约翰尼可以加密智能手机上的电子邮件吗?
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-10183-0_9
K. Schiller, Florian Adamsky
{"title":"Work in Progress: Can Johnny Encrypt E-Mails on Smartphones?","authors":"K. Schiller, Florian Adamsky","doi":"10.1007/978-3-031-10183-0_9","DOIUrl":"https://doi.org/10.1007/978-3-031-10183-0_9","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124978979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours 完善网络安全的钝工具:协调行为预防和保存的框架
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-79318-0_2
S. Parkin, Y. Chua
{"title":"Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours","authors":"S. Parkin, Y. Chua","doi":"10.1007/978-3-030-79318-0_2","DOIUrl":"https://doi.org/10.1007/978-3-030-79318-0_2","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129111368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Which Properties Has an Icon? A Critical Discussion on Data Protection Iconography 哪些属性有图标?关于数据保护图解的关键讨论
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-55958-8_12
Arianna Rossi, G. Lenzini
{"title":"Which Properties Has an Icon? A Critical Discussion on Data Protection Iconography","authors":"Arianna Rossi, G. Lenzini","doi":"10.1007/978-3-030-55958-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-55958-8_12","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130194881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Work in Progress: Towards Usable Updates for Smart Home Devices 正在进行的工作:实现智能家居设备的可用更新
Workshop on Socio-Technical Aspects in Security and Trust Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-79318-0_6
Julie M. Haney, S. Furman
{"title":"Work in Progress: Towards Usable Updates for Smart Home Devices","authors":"Julie M. Haney, S. Furman","doi":"10.1007/978-3-030-79318-0_6","DOIUrl":"https://doi.org/10.1007/978-3-030-79318-0_6","url":null,"abstract":"","PeriodicalId":262100,"journal":{"name":"Workshop on Socio-Technical Aspects in Security and Trust","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信