首页 > 最新文献

Symposium On Usable Privacy and Security最新文献

英文 中文
"Is Reporting Worth the Sacrifice of Revealing What I Have Sent?": Privacy Considerations When Reporting on End-to-End Encrypted Platforms “为了报道而牺牲我所发送的内容值得吗?”:端到端加密平台报告时的隐私考虑
Pub Date : 2023-06-18 DOI: 10.48550/arXiv.2306.10478
Leijie Wang, Ruotong Wang, S. Williams-Ceci, Sanketh Menda, Amy X. Zhang
User reporting is an essential component of content moderation on many online platforms -- in particular, on end-to-end encrypted (E2EE) messaging platforms where platform operators cannot proactively inspect message contents. However, users' privacy concerns when considering reporting may impede the effectiveness of this strategy in regulating online harassment. In this paper, we conduct interviews with 16 users of E2EE platforms to understand users' mental models of how reporting works and their resultant privacy concerns and considerations surrounding reporting. We find that users expect platforms to store rich longitudinal reporting datasets, recognizing both their promise for better abuse mitigation and the privacy risk that platforms may exploit or fail to protect them. We also find that users have preconceptions about the respective capabilities and risks of moderators at the platform versus community level -- for instance, users trust platform moderators more to not abuse their power but think community moderators have more time to attend to reports. These considerations, along with perceived effectiveness of reporting and how to provide sufficient evidence while maintaining privacy, shape how users decide whether, to whom, and how much to report. We conclude with design implications for a more privacy-preserving reporting system on E2EE messaging platforms.
在许多在线平台上,用户报告是内容审核的重要组成部分,特别是在端到端加密(E2EE)消息传递平台上,平台运营商无法主动检查消息内容。然而,用户在考虑举报时对隐私的担忧可能会阻碍这一策略在监管网络骚扰方面的有效性。在本文中,我们对16名E2EE平台的用户进行了访谈,以了解用户对报告如何工作的心理模型,以及他们由此产生的隐私问题和对报告的考虑。我们发现,用户期望平台存储丰富的纵向报告数据集,既认识到他们承诺更好地减少滥用,也认识到平台可能利用或未能保护他们的隐私风险。我们还发现,用户对平台和社区级别的版主各自的能力和风险有先入为主的看法——例如,用户更相信平台版主不会滥用权力,但认为社区版主有更多时间来处理报告。这些考虑因素,以及报告的有效性以及如何在保持隐私的同时提供足够的证据,决定了用户如何决定是否报告、向谁报告以及报告多少。最后,我们提出了一个在E2EE消息传递平台上更加保护隐私的报告系统的设计含义。
{"title":"\"Is Reporting Worth the Sacrifice of Revealing What I Have Sent?\": Privacy Considerations When Reporting on End-to-End Encrypted Platforms","authors":"Leijie Wang, Ruotong Wang, S. Williams-Ceci, Sanketh Menda, Amy X. Zhang","doi":"10.48550/arXiv.2306.10478","DOIUrl":"https://doi.org/10.48550/arXiv.2306.10478","url":null,"abstract":"User reporting is an essential component of content moderation on many online platforms -- in particular, on end-to-end encrypted (E2EE) messaging platforms where platform operators cannot proactively inspect message contents. However, users' privacy concerns when considering reporting may impede the effectiveness of this strategy in regulating online harassment. In this paper, we conduct interviews with 16 users of E2EE platforms to understand users' mental models of how reporting works and their resultant privacy concerns and considerations surrounding reporting. We find that users expect platforms to store rich longitudinal reporting datasets, recognizing both their promise for better abuse mitigation and the privacy risk that platforms may exploit or fail to protect them. We also find that users have preconceptions about the respective capabilities and risks of moderators at the platform versus community level -- for instance, users trust platform moderators more to not abuse their power but think community moderators have more time to attend to reports. These considerations, along with perceived effectiveness of reporting and how to provide sufficient evidence while maintaining privacy, shape how users decide whether, to whom, and how much to report. We conclude with design implications for a more privacy-preserving reporting system on E2EE messaging platforms.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132786065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iterative Design of An Accessible Crypto Wallet for Blind Users 盲人可访问加密钱包的迭代设计
Pub Date : 2023-06-09 DOI: 10.48550/arXiv.2306.06261
Zhixuan Zhou, Tanusree Sharma, Luke Emano, Sauvik Das, Yang Wang
Crypto wallets are a key touch-point for cryptocurrency use. People use crypto wallets to make transactions, manage crypto assets, and interact with decentralized apps (dApps). However, as is often the case with emergent technologies, little attention has been paid to understanding and improving accessibility barriers in crypto wallet software. We present a series of user studies that explored how both blind and sighted individuals use MetaMask, one of the most popular non-custodial crypto wallets. We uncovered inter-related accessibility, learnability, and security issues with MetaMask. We also report on an iterative redesign of MetaMask to make it more accessible for blind users. This process involved multiple evaluations with 44 novice crypto wallet users, including 20 sighted users, 23 blind users, and one user with low vision. Our study results show notable improvements for accessibility after two rounds of design iterations. Based on the results, we discuss design implications for creating more accessible and secure crypto wallets for blind users.
加密钱包是加密货币使用的关键接触点。人们使用加密钱包进行交易,管理加密资产,并与分散的应用程序(dApps)进行交互。然而,就像新兴技术经常出现的情况一样,人们很少关注理解和改善加密钱包软件中的可访问性障碍。我们提出了一系列用户研究,探讨盲人和正常人如何使用MetaMask,这是最受欢迎的非托管加密钱包之一。我们发现了与MetaMask相关的可访问性、可学习性和安全性问题。我们还报告了MetaMask的迭代重新设计,以使盲人用户更容易访问。这个过程涉及对44名新手加密钱包用户的多次评估,其中包括20名视力正常的用户,23名盲人用户和1名视力低下的用户。我们的研究结果表明,经过两轮设计迭代后,可访问性得到了显著改善。基于结果,我们讨论了为盲人用户创建更易于访问和安全的加密钱包的设计含义。
{"title":"Iterative Design of An Accessible Crypto Wallet for Blind Users","authors":"Zhixuan Zhou, Tanusree Sharma, Luke Emano, Sauvik Das, Yang Wang","doi":"10.48550/arXiv.2306.06261","DOIUrl":"https://doi.org/10.48550/arXiv.2306.06261","url":null,"abstract":"Crypto wallets are a key touch-point for cryptocurrency use. People use crypto wallets to make transactions, manage crypto assets, and interact with decentralized apps (dApps). However, as is often the case with emergent technologies, little attention has been paid to understanding and improving accessibility barriers in crypto wallet software. We present a series of user studies that explored how both blind and sighted individuals use MetaMask, one of the most popular non-custodial crypto wallets. We uncovered inter-related accessibility, learnability, and security issues with MetaMask. We also report on an iterative redesign of MetaMask to make it more accessible for blind users. This process involved multiple evaluations with 44 novice crypto wallet users, including 20 sighted users, 23 blind users, and one user with low vision. Our study results show notable improvements for accessibility after two rounds of design iterations. Based on the results, we discuss design implications for creating more accessible and secure crypto wallets for blind users.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129323299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fight Fire with Fire: Hacktivists' Take on Social Media Misinformation 以其人之道还治其人之身:黑客分子对社交媒体错误信息的看法
Pub Date : 2023-02-15 DOI: 10.48550/arXiv.2302.07788
Filipo Sharevski, Benjamin Kessell
In this study, we interviewed 22 prominent hacktivists to learn their take on the increased proliferation of misinformation on social media. We found that none of them welcomes the nefarious appropriation of trolling and memes for the purpose of political (counter)argumentation and dissemination of propaganda. True to the original hacker ethos, misinformation is seen as a threat to the democratic vision of the Internet, and as such, it must be confronted on the face with tried hacktivists' methods like deplatforming the"misinformers"and doxing or leaking data about their funding and recruitment. The majority of the hacktivists also recommended interventions for raising misinformation literacy in addition to targeted hacking campaigns. We discuss the implications of these findings relative to the emergent recasting of hacktivism in defense of a constructive and factual social media discourse.
在这项研究中,我们采访了22位杰出的黑客活动人士,了解他们对社交媒体上错误信息日益泛滥的看法。我们发现,他们都不欢迎恶意利用网络攻击和表情包来进行政治(反)辩论和传播宣传。与最初的黑客精神一样,错误信息被视为对互联网民主愿景的威胁,因此,必须用黑客激进主义者的方法来正面应对,比如让“错误信息提供者”下台,对他们的资金和招募进行追踪或泄露数据。除了有针对性的黑客活动外,大多数黑客活动人士还建议采取干预措施,提高错误信息素养。我们讨论了这些发现的含义,这些发现与黑客行动主义的新兴重塑有关,以捍卫建设性和事实性的社交媒体话语。
{"title":"Fight Fire with Fire: Hacktivists' Take on Social Media Misinformation","authors":"Filipo Sharevski, Benjamin Kessell","doi":"10.48550/arXiv.2302.07788","DOIUrl":"https://doi.org/10.48550/arXiv.2302.07788","url":null,"abstract":"In this study, we interviewed 22 prominent hacktivists to learn their take on the increased proliferation of misinformation on social media. We found that none of them welcomes the nefarious appropriation of trolling and memes for the purpose of political (counter)argumentation and dissemination of propaganda. True to the original hacker ethos, misinformation is seen as a threat to the democratic vision of the Internet, and as such, it must be confronted on the face with tried hacktivists' methods like deplatforming the\"misinformers\"and doxing or leaking data about their funding and recruitment. The majority of the hacktivists also recommended interventions for raising misinformation literacy in addition to targeted hacking campaigns. We discuss the implications of these findings relative to the emergent recasting of hacktivism in defense of a constructive and factual social media discourse.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117329889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design Space for Effective Privacy Notices 有效隐私通知的设计空间
Pub Date : 2015-07-22 DOI: 10.1017/9781316831960.021
F. Schaub, Rebecca Balebako, Adam L. Durity, L. Cranor
Notifying users about a system's data practices is supposed to enable users to make informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy policies, are often ineffective because they are neither usable nor useful, and are therefore ignored by users. Constrained interfaces on mobile devices, wearables, and smart home devices connected in an Internet of Things exacerbate the issue. Much research has studied usability issues of privacy notices and many proposals for more usable privacy notices exist. Yet, there is little guidance for designers and developers on the design aspects that can impact the effectiveness of privacy notices. In this paper, we make multiple contributions to remedy this issue. We survey the existing literature on privacy notices and identify challenges, requirements, and best practices for privacy notice design. Further, we map out the design space for privacy notices by identifying relevant dimensions. This provides a taxonomy and consistent terminology of notice approaches to foster understanding and reasoning about notice options available in the context of specific systems. Our systemization of knowledge and the developed design space can help designers, developers, and researchers identify notice and choice requirements and develop a comprehensive notice concept for their system that addresses the needs of different audiences and considers the system's limitations and opportunities for providing notice.
通知用户有关系统的数据实践应该使用户能够做出明智的隐私决定。然而,当前的通知和选择机制(如隐私策略)往往是无效的,因为它们既不可用也不有用,因此被用户忽略。物联网连接的移动设备、可穿戴设备和智能家居设备的受限接口加剧了这一问题。对隐私声明的可用性问题进行了大量的研究,并提出了许多提高隐私声明可用性的建议。然而,设计师和开发人员在影响隐私通知有效性的设计方面几乎没有指导。在本文中,我们做出了多方面的贡献来解决这个问题。我们调查了现有的关于隐私通知的文献,并确定了隐私通知设计的挑战、要求和最佳实践。此外,我们通过确定相关维度来绘制隐私通知的设计空间。这提供了通知方法的分类和一致的术语,以促进对特定系统上下文中可用的通知选项的理解和推理。我们的系统化知识和已开发的设计空间可以帮助设计师、开发人员和研究人员识别通知和选择需求,并为他们的系统开发一个全面的通知概念,以满足不同受众的需求,并考虑系统提供通知的局限性和机会。
{"title":"A Design Space for Effective Privacy Notices","authors":"F. Schaub, Rebecca Balebako, Adam L. Durity, L. Cranor","doi":"10.1017/9781316831960.021","DOIUrl":"https://doi.org/10.1017/9781316831960.021","url":null,"abstract":"Notifying users about a system's data practices is supposed to enable users to make informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy policies, are often ineffective because they are neither usable nor useful, and are therefore ignored by users. Constrained interfaces on mobile devices, wearables, and smart home devices connected in an Internet of Things exacerbate the issue. Much research has studied usability issues of privacy notices and many proposals for more usable privacy notices exist. Yet, there is little guidance for designers and developers on the design aspects that can impact the effectiveness of privacy notices. In this paper, we make multiple contributions to remedy this issue. We survey the existing literature on privacy notices and identify challenges, requirements, and best practices for privacy notice design. Further, we map out the design space for privacy notices by identifying relevant dimensions. This provides a taxonomy and consistent terminology of notice approaches to foster understanding and reasoning about notice options available in the context of specific systems. Our systemization of knowledge and the developed design space can help designers, developers, and researchers identify notice and choice requirements and develop a comprehensive notice concept for their system that addresses the needs of different audiences and considers the system's limitations and opportunities for providing notice.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115979819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 302
On the Memorability of System-generated PINs: Can Chunking Help? 关于系统生成pin的可记忆性:分块有帮助吗?
Pub Date : 2015-06-12 DOI: 10.5072/ZENODO.309748
J. Huh, Hyoungshick Kim, R. Bobba, Masooda N. Bashir, K. Beznosov
To ensure that users do not choose weak personal identification numbers (PINs), many banks give out systemgenerated random PINs. 4-digit is the most commonly used PIN length, but 6-digit system-generated PINs are also becoming popular. The increased security we get from using system-generated PINs, however, comes at the cost of memorability. And while banks are increasingly adopting systemgenerated PINs, the impact on memorability of such PINs has not been studied. We conducted a large-scale online user study with 9,114 participants to investigate the impact of increased PIN length on the memorability of PINs, and whether number chunking 1 techniques (breaking a single number into multiple smaller numbers) can be applied to improve memorability for larger PIN lengths. As one would expect, our study shows that system-generated 4-digit PINs outperform 6-, 7-, and 8-digit PINs in long-term memorability. Interestingly, however, we find that there is no statistically significant difference in memorability between 6-, 7-, and 8-digit PINs, indicating that 7-, and 8-digit PINs should also be considered when looking to increase PIN length to 6-digits from currently common length of 4-digits for improved security. By grouping all 6-, 7-, and 8-digit chunked PINs together, and comparing them against a group of all non-chunked PINs, we find that chunking, overall, improves memorability of system-generated PINs. To our surprise, however, none of the individual chunking policies (e.g., 0000-00-00) showed statistically significant improvement over their peer non� Part of this work was done while Dr. Huh and Dr. Bobba were at the University of Illinois. 1 Note that our notion of chunking differs from the traditional notion in that we do not chunk numbers into semantically meaningful pieces.
为了确保用户不会选择弱个人识别号码(pin),许多银行提供系统生成的随机pin。4位是最常用的PIN长度,但6位系统生成的PIN也越来越流行。然而,使用系统生成的pin所增加的安全性是以可记忆性为代价的。虽然银行越来越多地采用系统生成的密码,但这些密码对可记忆性的影响尚未得到研究。我们进行了一项有9114名参与者的大规模在线用户研究,以调查增加PIN长度对PIN可记忆性的影响,以及数字分块技术(将单个数字分解成多个较小的数字)是否可以应用于提高较大PIN长度的可记忆性。正如人们所期望的那样,我们的研究表明,系统生成的4位pin在长期记忆性方面优于6位、7位和8位pin。然而,有趣的是,我们发现6位、7位和8位PIN在可记忆性方面没有统计学上的显著差异,这表明在寻求将PIN长度从目前常见的4位长度增加到6位以提高安全性时,也应该考虑7位和8位PIN。通过将所有6位、7位和8位分块pin分组在一起,并将它们与一组所有非分块pin进行比较,我们发现分块总体上提高了系统生成pin的可记忆性。然而,令我们惊讶的是,没有一个单独的分块策略(例如,0000-00-00)在统计上比他们的同行表现出显著的改善。这项工作的一部分是在Huh博士和Bobba博士在伊利诺伊大学完成的。注意,我们的分块概念不同于传统的概念,因为我们不把数字分成语义上有意义的片段。
{"title":"On the Memorability of System-generated PINs: Can Chunking Help?","authors":"J. Huh, Hyoungshick Kim, R. Bobba, Masooda N. Bashir, K. Beznosov","doi":"10.5072/ZENODO.309748","DOIUrl":"https://doi.org/10.5072/ZENODO.309748","url":null,"abstract":"To ensure that users do not choose weak personal identification numbers (PINs), many banks give out systemgenerated random PINs. 4-digit is the most commonly used PIN length, but 6-digit system-generated PINs are also becoming popular. The increased security we get from using system-generated PINs, however, comes at the cost of memorability. And while banks are increasingly adopting systemgenerated PINs, the impact on memorability of such PINs has not been studied. We conducted a large-scale online user study with 9,114 participants to investigate the impact of increased PIN length on the memorability of PINs, and whether number chunking 1 techniques (breaking a single number into multiple smaller numbers) can be applied to improve memorability for larger PIN lengths. As one would expect, our study shows that system-generated 4-digit PINs outperform 6-, 7-, and 8-digit PINs in long-term memorability. Interestingly, however, we find that there is no statistically significant difference in memorability between 6-, 7-, and 8-digit PINs, indicating that 7-, and 8-digit PINs should also be considered when looking to increase PIN length to 6-digits from currently common length of 4-digits for improved security. By grouping all 6-, 7-, and 8-digit chunked PINs together, and comparing them against a group of all non-chunked PINs, we find that chunking, overall, improves memorability of system-generated PINs. To our surprise, however, none of the individual chunking policies (e.g., 0000-00-00) showed statistically significant improvement over their peer non� Part of this work was done while Dr. Huh and Dr. Bobba were at the University of Illinois. 1 Note that our notion of chunking differs from the traditional notion in that we do not chunk numbers into semantically meaningful pieces.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Retrospective privacy: managing longitudinal privacy in online social networks 回顾性隐私:在线社交网络纵向隐私管理
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501608
Oshrat Ayalon, Eran Toch
Online social networks provide access to the user's information for long periods of time after the information's initial publication. In this paper, we investigate the relation between information aging and its sharing preferences on Facebook. Our findings are based on a survey of 193 Facebook users, in which we asked users to specify their sharing preferences and intentions towards posts that were published in different periods of time (from the time of the survey and up to 24 months prior to the time of the survey.) Our results show that willingness to share significantly drops with the time passed since publishing the post. The occurrence of life changes, such as graduating from college or moving to a new town, is correlated with a further decrease in the willingness to share. We discuss our findings by relating it to information aging theories and privacy theories. Finally, we use our results to reflect on privacy mechanisms for long-term usage of online social networks, such as expiry date for content and historical information reviewing processes.
在线社交网络在用户信息最初发布后的很长一段时间内提供对用户信息的访问。在本文中,我们研究了信息老化与其在Facebook上的分享偏好之间的关系。我们的发现是基于对193名Facebook用户的调查,在调查中,我们要求用户指定他们在不同时期(从调查开始到调查前24个月)发布的帖子的分享偏好和意图。我们的研究结果显示,随着帖子发布时间的推移,分享的意愿显著下降。生活变化的发生,如大学毕业或搬到一个新的城镇,与分享意愿的进一步下降有关。我们通过将其与信息老化理论和隐私理论联系起来讨论我们的发现。最后,我们使用我们的结果来反映在线社交网络长期使用的隐私机制,例如内容的到期日期和历史信息审查过程。
{"title":"Retrospective privacy: managing longitudinal privacy in online social networks","authors":"Oshrat Ayalon, Eran Toch","doi":"10.1145/2501604.2501608","DOIUrl":"https://doi.org/10.1145/2501604.2501608","url":null,"abstract":"Online social networks provide access to the user's information for long periods of time after the information's initial publication. In this paper, we investigate the relation between information aging and its sharing preferences on Facebook. Our findings are based on a survey of 193 Facebook users, in which we asked users to specify their sharing preferences and intentions towards posts that were published in different periods of time (from the time of the survey and up to 24 months prior to the time of the survey.) Our results show that willingness to share significantly drops with the time passed since publishing the post. The occurrence of life changes, such as graduating from college or moving to a new town, is correlated with a further decrease in the willingness to share. We discuss our findings by relating it to information aging theories and privacy theories. Finally, we use our results to reflect on privacy mechanisms for long-term usage of online social networks, such as expiry date for content and historical information reviewing processes.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116823052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
On the ecological validity of a password study 论密码研究的生态效度
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501617
S. Fahl, M. Harbach, Y. Acar, Matthew Smith
The ecological validity of password studies is a complex topic and difficult to quantify. Most researchers who conduct password user studies try to address the issue in their study design. However, the methods researchers use to try to improve ecological validity vary and some methods even contradict each other. One reason for this is that the very nature of the problem of ecological validity of password studies is hard to study, due to the lack of ground truth. In this paper, we present a study on the ecological validity of password studies designed specifically to shed light on this issue. We were able to compare the behavior of 645 study participants with their real world password choices. We conducted both online and laboratory studies, under priming and non-priming conditions, to be able to evaluate the effects of these different forms of password studies. While our study is able to investigate only one specific password environment used by a limited population and thus cannot answer all questions about ecological validity, it does represent a first important step in judging the impact of ecological validity on password studies.
密码研究的生态效度是一个复杂且难以量化的课题。大多数进行密码用户研究的研究人员试图在他们的研究设计中解决这个问题。然而,研究人员试图提高生态效度的方法各不相同,有些方法甚至相互矛盾。其中一个原因是,密码研究的生态有效性问题的本质是难以研究的,因为缺乏基础真理。在本文中,我们提出了一项研究的生态有效性的密码研究专门设计来阐明这一问题。我们能够将645名研究参与者的行为与他们在现实世界中选择的密码进行比较。我们在启动和非启动条件下进行了在线和实验室研究,以评估这些不同形式的密码研究的效果。虽然我们的研究只能调查有限人群使用的一种特定密码环境,因此不能回答有关生态效度的所有问题,但它确实代表了判断生态效度对密码研究影响的重要第一步。
{"title":"On the ecological validity of a password study","authors":"S. Fahl, M. Harbach, Y. Acar, Matthew Smith","doi":"10.1145/2501604.2501617","DOIUrl":"https://doi.org/10.1145/2501604.2501617","url":null,"abstract":"The ecological validity of password studies is a complex topic and difficult to quantify. Most researchers who conduct password user studies try to address the issue in their study design. However, the methods researchers use to try to improve ecological validity vary and some methods even contradict each other. One reason for this is that the very nature of the problem of ecological validity of password studies is hard to study, due to the lack of ground truth. In this paper, we present a study on the ecological validity of password studies designed specifically to shed light on this issue. We were able to compare the behavior of 645 study participants with their real world password choices. We conducted both online and laboratory studies, under priming and non-priming conditions, to be able to evaluate the effects of these different forms of password studies. While our study is able to investigate only one specific password environment used by a limited population and thus cannot answer all questions about ecological validity, it does represent a first important step in judging the impact of ecological validity on password studies.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132680855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
Memory retrieval and graphical passwords 记忆检索和图形密码
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501619
E. Stobert, R. Biddle
Graphical passwords are an alternative form of authentication that use images for login, and leverage the picture superiority effect for good usability and memorability. Categories of graphical passwords have been distinguished on the basis of different kinds of memory retrieval (recall, cued-recall, and recognition). Psychological research suggests that leveraging recognition memory should be best, but this remains an open question in the password literature. This paper examines how different kinds of memory retrieval affect the memorability and usability of random assigned graphical passwords. A series of five studies of graphical and text passwords showed that participants were able to better remember recognition-based graphical passwords, but their usability was limited by slow login times. A graphical password scheme that leveraged recognition and recall memory was most successful at combining memorability and usability.
图形密码是另一种身份验证形式,它使用图像进行登录,并利用图像优势效果获得良好的可用性和可记忆性。图形密码的分类基于不同的记忆检索(回忆、提示回忆和识别)。心理学研究表明,利用识别记忆应该是最好的,但这在密码文献中仍然是一个悬而未决的问题。本文研究了不同类型的记忆检索如何影响随机分配图形密码的可记忆性和可用性。五项关于图形密码和文本密码的一系列研究表明,参与者能够更好地记住基于识别的图形密码,但它们的可用性受到登录时间较慢的限制。利用识别和回忆记忆的图形密码方案在结合记忆性和可用性方面最为成功。
{"title":"Memory retrieval and graphical passwords","authors":"E. Stobert, R. Biddle","doi":"10.1145/2501604.2501619","DOIUrl":"https://doi.org/10.1145/2501604.2501619","url":null,"abstract":"Graphical passwords are an alternative form of authentication that use images for login, and leverage the picture superiority effect for good usability and memorability. Categories of graphical passwords have been distinguished on the basis of different kinds of memory retrieval (recall, cued-recall, and recognition). Psychological research suggests that leveraging recognition memory should be best, but this remains an open question in the password literature. This paper examines how different kinds of memory retrieval affect the memorability and usability of random assigned graphical passwords. A series of five studies of graphical and text passwords showed that participants were able to better remember recognition-based graphical passwords, but their usability was limited by slow login times. A graphical password scheme that leveraged recognition and recall memory was most successful at combining memorability and usability.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130093408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Sleights of privacy: framing, disclosures, and the limits of transparency 隐私的诡计:框架、披露和透明度的限制
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501613
Idris Adjerid, A. Acquisti, L. Brandimarte, G. Loewenstein
In an effort to address persistent consumer privacy concerns, policy makers and the data industry seem to have found common grounds in proposals that aim at making online privacy more "transparent." Such self-regulatory approaches rely on, among other things, providing more and better information to users of Internet services about how their data is used. However, we illustrate in a series of experiments that even simple privacy notices do not consistently impact disclosure behavior, and may in fact be used to nudge individuals to disclose variable amounts of personal information. In a first experiment, we demonstrate that the impact of privacy notices on disclosure is sensitive to relative judgments, even when the objective risks of disclosure actually stay constant. In a second experiment, we show that the impact of privacy notices on disclosure can be muted by introducing simple misdirections that do not alter the objective risk of disclosure. These findings cast doubts on the likelihood of initiatives predicated around notices and transparency to address, by themselves, online privacy concerns.
为了解决持续存在的消费者隐私问题,政策制定者和数据行业似乎在旨在使在线隐私更加“透明”的提案中找到了共同点。这种自我监管的方法依赖于向互联网服务用户提供更多更好的信息,了解他们的数据是如何被使用的。然而,我们在一系列实验中说明,即使是简单的隐私通知也不会始终如一地影响披露行为,实际上可能被用来推动个人披露可变数量的个人信息。在第一个实验中,我们证明了即使在披露的客观风险实际上保持不变的情况下,隐私通知对披露的影响对相对判断是敏感的。在第二个实验中,我们表明,隐私通知对信息披露的影响可以通过引入简单的误导来减弱,这种误导不会改变信息披露的客观风险。这些发现让人怀疑,以通知和透明度为基础的举措是否有可能自行解决在线隐私问题。
{"title":"Sleights of privacy: framing, disclosures, and the limits of transparency","authors":"Idris Adjerid, A. Acquisti, L. Brandimarte, G. Loewenstein","doi":"10.1145/2501604.2501613","DOIUrl":"https://doi.org/10.1145/2501604.2501613","url":null,"abstract":"In an effort to address persistent consumer privacy concerns, policy makers and the data industry seem to have found common grounds in proposals that aim at making online privacy more \"transparent.\" Such self-regulatory approaches rely on, among other things, providing more and better information to users of Internet services about how their data is used. However, we illustrate in a series of experiments that even simple privacy notices do not consistently impact disclosure behavior, and may in fact be used to nudge individuals to disclose variable amounts of personal information. In a first experiment, we demonstrate that the impact of privacy notices on disclosure is sensitive to relative judgments, even when the objective risks of disclosure actually stay constant. In a second experiment, we show that the impact of privacy notices on disclosure can be muted by introducing simple misdirections that do not alter the objective risk of disclosure. These findings cast doubts on the likelihood of initiatives predicated around notices and transparency to address, by themselves, online privacy concerns.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129015619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 124
Do not embarrass: re-examining user concerns for online tracking and advertising 不要尴尬:重新审视用户对在线跟踪和广告的担忧
Pub Date : 2013-07-24 DOI: 10.1145/2501604.2501612
L. Agarwal, Nisheeth Shrivastava, S. Jaiswal, S. Panjwani
Recent studies have highlighted user concerns with respect to third-party tracking and online behavioral advertising (OBA) and the need for better consumer choice mechanisms to address these phenomena. We re-investigate the question of perceptions of third-party tracking while situating it in the larger context of how online ads, in general, are perceived by users. Via in-depth interviews with 53 Web users in India, we find that although concerns for third-party tracking and OBA remain noticeable amongst this population, other aspects of online advertising---like the possibility of being shown ads with embarrassing and suggestive content---are voiced as greater concerns than the concern of being tracked. Current-day blocking tools are insufficient to redress the situation: users demand selective filtering of ad content (as opposed to blocking out all ads) and are not satisfied with mechanisms that only control tracking and OBA. We conclude with design recommendations for enduser tools to control online ad consumption keeping in mind the concerns brought forth by our study.
最近的研究强调了用户对第三方跟踪和在线行为广告(OBA)的关注,以及需要更好的消费者选择机制来解决这些现象。我们重新调查了第三方跟踪的感知问题,同时将其置于用户如何感知在线广告的更大背景下。通过对53位印度网络用户的深度访谈,我们发现,尽管这一人群对第三方跟踪和OBA的担忧仍然很明显,但在线广告的其他方面——比如看到带有尴尬和暗示性内容的广告的可能性——比被跟踪的担忧更令人担忧。当前的屏蔽工具不足以纠正这种情况:用户要求有选择性地过滤广告内容(而不是屏蔽所有广告),并且不满足于仅控制跟踪和OBA的机制。最后,我们对控制在线广告消费的终端用户工具提出了设计建议,并牢记我们研究中提出的问题。
{"title":"Do not embarrass: re-examining user concerns for online tracking and advertising","authors":"L. Agarwal, Nisheeth Shrivastava, S. Jaiswal, S. Panjwani","doi":"10.1145/2501604.2501612","DOIUrl":"https://doi.org/10.1145/2501604.2501612","url":null,"abstract":"Recent studies have highlighted user concerns with respect to third-party tracking and online behavioral advertising (OBA) and the need for better consumer choice mechanisms to address these phenomena. We re-investigate the question of perceptions of third-party tracking while situating it in the larger context of how online ads, in general, are perceived by users. Via in-depth interviews with 53 Web users in India, we find that although concerns for third-party tracking and OBA remain noticeable amongst this population, other aspects of online advertising---like the possibility of being shown ads with embarrassing and suggestive content---are voiced as greater concerns than the concern of being tracked. Current-day blocking tools are insufficient to redress the situation: users demand selective filtering of ad content (as opposed to blocking out all ads) and are not satisfied with mechanisms that only control tracking and OBA. We conclude with design recommendations for enduser tools to control online ad consumption keeping in mind the concerns brought forth by our study.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132618592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
期刊
Symposium On Usable Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1