首页 > 最新文献

Symposium On Usable Privacy and Security最新文献

英文 中文
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications 金凤花和两个移动设备:超越对设备应用程序的全有或全无访问
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335359
Eiji Hayashi, Oriana Riva, K. Strauss, A. Brush, Stuart E. Schechter
Most mobile phones and tablets support only two access control device states: locked and unlocked. We investigated how well all or-nothing device access control meets the need of users by interviewing 20 participants who had both a smartphone and tablet. We find all-or-nothing device access control to be a remarkably poor fit with users' preferences. On both phones and tablets, participants wanted roughly half their applications to be available even when their device was locked and half protected by authentication. We also solicited participants' interest in new access control mechanisms designed specifically to facilitate device sharing. Fourteen participants out of 20 preferred these controls to existing security locks alone. Finally, we gauged participants' interest in using face and voice biometrics to authenticate to their mobile phone and tablets; participants were surprisingly receptive to biometrics, given that they were also aware of security and reliability limitations.
大多数手机和平板电脑只支持两种门禁设备状态:锁定和解锁。我们通过采访20名同时拥有智能手机和平板电脑的参与者,调查了全有或全无设备访问控制如何满足用户的需求。我们发现“要么全有,要么全无”的设备访问控制非常不符合用户的偏好。在手机和平板电脑上,参与者希望大约一半的应用程序可以使用,即使他们的设备被锁定,一半的应用程序受到身份验证的保护。我们还征求与会者对专门为促进设备共享而设计的新的访问控制机制的兴趣。20个参与者中有14个更喜欢这些控制而不是现有的安全锁。最后,我们衡量了参与者对使用面部和语音生物识别技术进行手机和平板电脑身份验证的兴趣;考虑到安全性和可靠性的限制,参与者对生物识别技术的接受程度令人惊讶。
{"title":"Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications","authors":"Eiji Hayashi, Oriana Riva, K. Strauss, A. Brush, Stuart E. Schechter","doi":"10.1145/2335356.2335359","DOIUrl":"https://doi.org/10.1145/2335356.2335359","url":null,"abstract":"Most mobile phones and tablets support only two access control device states: locked and unlocked. We investigated how well all or-nothing device access control meets the need of users by interviewing 20 participants who had both a smartphone and tablet. We find all-or-nothing device access control to be a remarkably poor fit with users' preferences. On both phones and tablets, participants wanted roughly half their applications to be available even when their device was locked and half protected by authentication. We also solicited participants' interest in new access control mechanisms designed specifically to facilitate device sharing. Fourteen participants out of 20 preferred these controls to existing security locks alone. Finally, we gauged participants' interest in using face and voice biometrics to authenticate to their mobile phone and tablets; participants were surprisingly receptive to biometrics, given that they were also aware of security and reliability limitations.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125271123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
Do you see your password?: applying recognition to textual passwords 你看到你的密码了吗?:对文本密码进行识别
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335367
Nicholas Wright, Andrew S. Patrick, R. Biddle
Text-based password systems are the authentication mechanism most commonly used on computer systems. Graphical passwords have recently been proposed because the pictorial-superiority effect suggests that people have better memory for images. The most widely advocated graphical password systems are based on recognition rather than recall. This approach is favored because recognition is a more effective manner of retrieval than recall, exhibiting greater accuracy and longevity of material. However, schemes such as these combine both the use of graphical images and the use of recognition as a retrieval mechanism. This paper reports on a study that sought to address this confound by exploring the recognition of text as a novel means of authentication. We hypothesized that there would be significant differences between text recognition and text recall conditions. Our study, however, showed that the conditions were comparable; we found no significant difference in memorability. Furthermore, text recognition required more time to authenticate successfully.
基于文本的密码系统是计算机系统中最常用的认证机制。图形密码最近被提出,因为图形优势效应表明人们对图像有更好的记忆力。最广泛提倡的图形密码系统是基于识别而不是记忆。这种方法受到青睐,因为识别是一种比回忆更有效的检索方式,表现出更高的准确性和材料的寿命。然而,诸如此类的方案结合了图形图像的使用和识别作为检索机制的使用。本文报告了一项研究,该研究试图通过探索文本识别作为一种新的认证手段来解决这一困惑。我们假设文本识别和文本回忆条件之间存在显著差异。然而,我们的研究表明,这两种情况具有可比性;我们发现记忆力没有显著差异。此外,文本识别需要更多的时间来成功地进行身份验证。
{"title":"Do you see your password?: applying recognition to textual passwords","authors":"Nicholas Wright, Andrew S. Patrick, R. Biddle","doi":"10.1145/2335356.2335367","DOIUrl":"https://doi.org/10.1145/2335356.2335367","url":null,"abstract":"Text-based password systems are the authentication mechanism most commonly used on computer systems. Graphical passwords have recently been proposed because the pictorial-superiority effect suggests that people have better memory for images. The most widely advocated graphical password systems are based on recognition rather than recall. This approach is favored because recognition is a more effective manner of retrieval than recall, exhibiting greater accuracy and longevity of material. However, schemes such as these combine both the use of graphical images and the use of recognition as a retrieval mechanism. This paper reports on a study that sought to address this confound by exploring the recognition of text as a novel means of authentication. We hypothesized that there would be significant differences between text recognition and text recall conditions. Our study, however, showed that the conditions were comparable; we found no significant difference in memorability. Furthermore, text recognition required more time to authenticate successfully.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131054332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Facebook and privacy: it's complicated Facebook和隐私:这很复杂
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335369
Maritza L. Johnson, Serge Egelman, S. Bellovin
We measure users' attitudes toward interpersonal privacy concerns on Facebook and measure users' strategies for reconciling their concerns with their desire to share content online. To do this, we recruited 260 Facebook users to install a Facebook application that surveyed their privacy concerns, their friend network compositions, the sensitivity of posted content, and their privacy-preserving strategies. By asking participants targeted questions about people randomly selected from their friend network and posts shared on their profiles, we were able to quantify the extent to which users trust their "friends" and the likelihood that their content was being viewed by unintended audiences. We found that while strangers are the most concerning audience, almost 95% of our participants had taken steps to mitigate those concerns. At the same time, we observed that 16.5% of participants had at least one post that they were uncomfortable sharing with a specific friend---someone who likely already had the ability to view it---and that 37% raised more general concerns with sharing their content with friends. We conclude that the current privacy controls allow users to effectively manage the outsider threat, but that they are unsuitable for mitigating concerns over the insider threat---members of the friend network who dynamically become inappropriate audiences based on the context of a post.
我们测量了用户对Facebook上人际隐私问题的态度,并测量了用户协调他们的担忧与他们在线分享内容的愿望的策略。为此,我们招募了260名Facebook用户来安装一个Facebook应用程序,该应用程序调查了他们对隐私的担忧、他们的朋友网络构成、发布内容的敏感性以及他们的隐私保护策略。通过向参与者询问有关从他们的朋友网络中随机选择的人以及他们个人资料上分享的帖子的针对性问题,我们能够量化用户对他们“朋友”的信任程度,以及他们的内容被意外受众浏览的可能性。我们发现,虽然陌生人是最令人担忧的听众,但几乎95%的参与者都采取了措施来减轻这些担忧。与此同时,我们观察到,16.5%的参与者至少有一个帖子让他们不愿意与某个特定的朋友分享——这个朋友可能已经有能力查看它——37%的人对与朋友分享他们的内容表示更普遍的担忧。我们得出的结论是,当前的隐私控制允许用户有效地管理外部威胁,但它们不适合减轻对内部威胁的担忧——朋友网络的成员会根据帖子的上下文动态地成为不合适的受众。
{"title":"Facebook and privacy: it's complicated","authors":"Maritza L. Johnson, Serge Egelman, S. Bellovin","doi":"10.1145/2335356.2335369","DOIUrl":"https://doi.org/10.1145/2335356.2335369","url":null,"abstract":"We measure users' attitudes toward interpersonal privacy concerns on Facebook and measure users' strategies for reconciling their concerns with their desire to share content online. To do this, we recruited 260 Facebook users to install a Facebook application that surveyed their privacy concerns, their friend network compositions, the sensitivity of posted content, and their privacy-preserving strategies. By asking participants targeted questions about people randomly selected from their friend network and posts shared on their profiles, we were able to quantify the extent to which users trust their \"friends\" and the likelihood that their content was being viewed by unintended audiences. We found that while strangers are the most concerning audience, almost 95% of our participants had taken steps to mitigate those concerns. At the same time, we observed that 16.5% of participants had at least one post that they were uncomfortable sharing with a specific friend---someone who likely already had the ability to view it---and that 37% raised more general concerns with sharing their content with friends. We conclude that the current privacy controls allow users to effectively manage the outsider threat, but that they are unsuitable for mitigating concerns over the insider threat---members of the friend network who dynamically become inappropriate audiences based on the context of a post.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124411686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 224
Stories as informal lessons about security 故事是关于安全的非正式课程
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335364
E. Rader, Rick Wash, Brandon Brooks
Non-expert computer users regularly need to make security-relevant decisions; however, these decisions tend not to be particularly good or sophisticated. Nevertheless, their choices are not random. Where does the information come from that these non-experts base their decisions upon? We argue that much of this information comes from stories they hear from other people. We conducted a survey to ask open- and closed- ended questions about security stories people hear from others. We found that most people have learned lessons from stories about security incidents informally from family and friends. These stories impact the way people think about security, and their subsequent behavior when making security-relevant decisions. In addition, many people retell these stories to others, indicating that a single story has the potential to influence multiple people. Understanding how non-experts learn from stories, and what kinds of stories they learn from, can help us figure out new methods for helping these people make better security decisions.
非专业计算机用户经常需要做出与安全相关的决策;然而,这些决定往往不是特别好或复杂。然而,他们的选择并不是随机的。这些非专家的决策所依据的信息从何而来?我们认为,这些信息大多来自于他们从别人那里听到的故事。我们进行了一项调查,询问人们从别人那里听到的安全故事的开放式和封闭式问题。我们发现,大多数人都非正式地从家人和朋友那里学到安全事件的教训。这些故事影响了人们思考安全性的方式,以及他们在做出与安全性相关的决策时的后续行为。此外,很多人会把这些故事复述给别人听,这表明一个故事有可能影响很多人。了解非专家如何从故事中学习,以及他们从什么类型的故事中学习,可以帮助我们找到帮助这些人做出更好的安全决策的新方法。
{"title":"Stories as informal lessons about security","authors":"E. Rader, Rick Wash, Brandon Brooks","doi":"10.1145/2335356.2335364","DOIUrl":"https://doi.org/10.1145/2335356.2335364","url":null,"abstract":"Non-expert computer users regularly need to make security-relevant decisions; however, these decisions tend not to be particularly good or sophisticated. Nevertheless, their choices are not random. Where does the information come from that these non-experts base their decisions upon? We argue that much of this information comes from stories they hear from other people. We conducted a survey to ask open- and closed- ended questions about security stories people hear from others. We found that most people have learned lessons from stories about security incidents informally from family and friends. These stories impact the way people think about security, and their subsequent behavior when making security-relevant decisions. In addition, many people retell these stories to others, indicating that a single story has the potential to influence multiple people. Understanding how non-experts learn from stories, and what kinds of stories they learn from, can help us figure out new methods for helping these people make better security decisions.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127925758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 158
+Your circles: sharing behavior on Google+ 你的圈子:在Google+上分享行为
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335373
J. Watson, Andrew Besmer, H. Lipford
Users are sharing and consuming enormous amounts of information through online social network interaction every day. Yet, many users struggle to control what they share to their overlapping social spheres. Google+ introduces circles, a mechanism that enables users to group friends and use these groups to control their social network feeds and posts. We present the results of a qualitative interview study on the sharing perceptions and behavior of 27 Google+ users. These results indicate that many users have a clear understanding of circles, using them to target information to those most interested in it. Yet, despite these positive perceptions, there is only moderate use of circles to control information flow. We explore reasons and risks associated with these behaviors and provide insight on the impact and open questions of this privacy mechanism.
用户每天都在通过在线社交网络互动分享和消费大量信息。然而,许多用户很难控制他们在重叠的社交领域中分享的内容。b谷歌+引入了圈子,这是一种使用户能够将朋友分组并使用这些分组来控制他们的社交网络提要和帖子的机制。我们提出了一项关于27亿用户的分享观念和行为的定性访谈研究的结果。这些结果表明,许多用户对圈子有清晰的理解,并使用它们将信息定向到最感兴趣的人。然而,尽管有这些积极的看法,只有适度使用圈子来控制信息流。我们探讨了与这些行为相关的原因和风险,并就这种隐私机制的影响和开放问题提供了见解。
{"title":"+Your circles: sharing behavior on Google+","authors":"J. Watson, Andrew Besmer, H. Lipford","doi":"10.1145/2335356.2335373","DOIUrl":"https://doi.org/10.1145/2335356.2335373","url":null,"abstract":"Users are sharing and consuming enormous amounts of information through online social network interaction every day. Yet, many users struggle to control what they share to their overlapping social spheres. Google+ introduces circles, a mechanism that enables users to group friends and use these groups to control their social network feeds and posts. We present the results of a qualitative interview study on the sharing perceptions and behavior of 27 Google+ users. These results indicate that many users have a clear understanding of circles, using them to target information to those most interested in it. Yet, despite these positive perceptions, there is only moderate use of circles to control information flow. We explore reasons and risks associated with these behaviors and provide insight on the impact and open questions of this privacy mechanism.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128726984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice 原因、回报、遗憾:位置共享互动实践中的隐私考量
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335363
S. Patil, Gregory Norcie, Apu Kapadia, Adam J. Lee
Rapid growth in the usage of location-aware mobile phones has enabled mainstream adoption of location-sharing services (LSS). Integration with social-networking services (SNS) has further accelerated this trend. To uncover how these developments have shaped the evolution of LSS usage, we conducted an online study (N = 362) aimed at understanding the preferences and practices of LSS users in the US. We found that the main motivations for location sharing were to connect and coordinate with one's social and professional circles, to project an interesting image of oneself, and to receive rewards offered for 'checking in.' Respondents overwhelmingly preferred sharing location only upon explicit action. More than a quarter of the respondents recalled at least one instance of regret over revealing their location. Our findings suggest that privacy considerations in LSS are affected due to integration within SNS platforms and by transformation of location sharing into an interactive practice that is no longer limited only to finding people based on their whereabouts. We offer design suggestions, such as delayed disclosure and conflict detection, to enhance privacy-management capabilities of LSS.
位置感知移动电话的使用迅速增长,使得位置共享服务(LSS)成为主流。与社交网络服务(SNS)的整合进一步加速了这一趋势。为了揭示这些发展如何影响LSS使用的演变,我们进行了一项在线研究(N = 362),旨在了解美国LSS用户的偏好和实践。我们发现,分享位置的主要动机是为了与自己的社交圈和专业圈建立联系和协调,展示自己有趣的形象,以及获得“签到”的奖励。绝大多数受访者只在明确行动的情况下才愿意分享位置。超过四分之一的受访者回忆起至少一次因透露自己的位置而后悔。我们的研究结果表明,由于SNS平台的整合以及位置共享转变为一种互动实践,不再局限于根据人们的行踪寻找人们,LSS中的隐私考虑受到了影响。为增强LSS的隐私管理能力,我们提出了延迟披露、冲突检测等设计建议。
{"title":"Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice","authors":"S. Patil, Gregory Norcie, Apu Kapadia, Adam J. Lee","doi":"10.1145/2335356.2335363","DOIUrl":"https://doi.org/10.1145/2335356.2335363","url":null,"abstract":"Rapid growth in the usage of location-aware mobile phones has enabled mainstream adoption of location-sharing services (LSS). Integration with social-networking services (SNS) has further accelerated this trend. To uncover how these developments have shaped the evolution of LSS usage, we conducted an online study (N = 362) aimed at understanding the preferences and practices of LSS users in the US. We found that the main motivations for location sharing were to connect and coordinate with one's social and professional circles, to project an interesting image of oneself, and to receive rewards offered for 'checking in.' Respondents overwhelmingly preferred sharing location only upon explicit action. More than a quarter of the respondents recalled at least one instance of regret over revealing their location. Our findings suggest that privacy considerations in LSS are affected due to integration within SNS platforms and by transformation of location sharing into an interactive practice that is no longer limited only to finding people based on their whereabouts. We offer design suggestions, such as delayed disclosure and conflict detection, to enhance privacy-management capabilities of LSS.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130801666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Measuring user confidence in smartphone security and privacy 衡量用户对智能手机安全和隐私的信心
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335358
Erika Chin, A. Felt, V. Sekar, D. Wagner
In order to direct and build an effective, secure mobile ecosystem, we must first understand user attitudes toward security and privacy for smartphones and how they may differ from attitudes toward more traditional computing systems. What are users' comfort levels in performing different tasks? How do users select applications? What are their overall perceptions of the platform? This understanding will help inform the design of more secure smartphones that will enable users to safely and confidently benefit from the potential and convenience offered by mobile platforms. To gain insight into user perceptions of smartphone security and installation habits, we conduct a user study involving 60 smartphone users. First, we interview users about their willingness to perform certain tasks on their smartphones to test the hypothesis that people currently avoid using their phones due to privacy and security concerns. Second, we analyze why and how they select applications, which provides information about how users decide to trust applications. Based on our findings, we present recommendations and opportunities for services that will help users safely and confidently use mobile applications and platforms.
为了指导和建立一个有效、安全的移动生态系统,我们必须首先了解用户对智能手机安全和隐私的态度,以及他们对更传统的计算系统的态度有何不同。用户在执行不同任务时的舒适程度是什么?用户如何选择应用程序?他们对平台的总体看法是什么?这种理解将有助于设计更安全的智能手机,使用户能够安全、自信地从移动平台提供的潜力和便利中受益。为了深入了解用户对智能手机安全性和安装习惯的看法,我们进行了一项涉及60名智能手机用户的用户研究。首先,我们采访用户,了解他们在智能手机上执行某些任务的意愿,以验证人们目前出于隐私和安全考虑而避免使用手机的假设。其次,我们分析了他们为什么以及如何选择应用程序,这提供了关于用户如何决定信任应用程序的信息。根据我们的研究结果,我们提出了建议和机会,以帮助用户安全、自信地使用移动应用程序和平台。
{"title":"Measuring user confidence in smartphone security and privacy","authors":"Erika Chin, A. Felt, V. Sekar, D. Wagner","doi":"10.1145/2335356.2335358","DOIUrl":"https://doi.org/10.1145/2335356.2335358","url":null,"abstract":"In order to direct and build an effective, secure mobile ecosystem, we must first understand user attitudes toward security and privacy for smartphones and how they may differ from attitudes toward more traditional computing systems. What are users' comfort levels in performing different tasks? How do users select applications? What are their overall perceptions of the platform? This understanding will help inform the design of more secure smartphones that will enable users to safely and confidently benefit from the potential and convenience offered by mobile platforms.\u0000 To gain insight into user perceptions of smartphone security and installation habits, we conduct a user study involving 60 smartphone users. First, we interview users about their willingness to perform certain tasks on their smartphones to test the hypothesis that people currently avoid using their phones due to privacy and security concerns. Second, we analyze why and how they select applications, which provides information about how users decide to trust applications. Based on our findings, we present recommendations and opportunities for services that will help users safely and confidently use mobile applications and platforms.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 371
Smart, useful, scary, creepy: perceptions of online behavioral advertising 聪明、有用、可怕、令人毛骨悚然:对在线行为广告的看法
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335362
Blase Ur, P. Leon, L. Cranor, Richard Shay, Yang Wang
We report results of 48 semi-structured interviews about online behavioral advertising (OBA). We investigated non-technical users' attitudes about and understanding of OBA, using participants' expectations and beliefs to explain their attitudes. Participants found OBA to be simultaneously useful and privacy invasive. They were surprised to learn that browsing history is currently used to tailor advertisements, yet they were aware of contextual targeting. Our results identify mismatches between participants' mental models and current approaches for providing users with notice and choice about OBA. Participants misinterpreted icons intended to notify them about behavioral targeting and expected that they could turn to their browser or antivirus software to control OBA. Participants had strong concerns about data collection, and the majority of participants believed that advertisers collect personally identifiable information. They also misunderstood the role of advertising networks, basing their opinions of an advertising network on that company's non-advertising activities. Participants' attitudes towards OBA were complex and context-dependent. While many participants felt tailored advertising could benefit them, existing notice and choice mechanisms are not effectively reaching users.
我们报告了48个关于在线行为广告(OBA)的半结构化访谈的结果。我们调查了非技术用户对OBA的态度和理解,使用参与者的期望和信念来解释他们的态度。参与者发现OBA既有用又侵犯隐私。他们惊讶地发现,浏览历史记录目前是用来定制广告的,但他们知道上下文定位。我们的研究结果确定了参与者的心智模型与当前为用户提供关于OBA的注意和选择的方法之间的不匹配。参与者误解了图标意在通知他们有关行为定位的信息,并期望他们可以求助于浏览器或杀毒软件来控制OBA。参与者对数据收集有强烈的担忧,大多数参与者认为广告商收集个人身份信息。他们还误解了广告网络的作用,将他们对广告网络的看法建立在该公司的非广告活动上。参与者对OBA的态度是复杂的和情境依赖的。虽然许多参与者认为量身定制的广告可以使他们受益,但现有的通知和选择机制并没有有效地到达用户。
{"title":"Smart, useful, scary, creepy: perceptions of online behavioral advertising","authors":"Blase Ur, P. Leon, L. Cranor, Richard Shay, Yang Wang","doi":"10.1145/2335356.2335362","DOIUrl":"https://doi.org/10.1145/2335356.2335362","url":null,"abstract":"We report results of 48 semi-structured interviews about online behavioral advertising (OBA). We investigated non-technical users' attitudes about and understanding of OBA, using participants' expectations and beliefs to explain their attitudes. Participants found OBA to be simultaneously useful and privacy invasive. They were surprised to learn that browsing history is currently used to tailor advertisements, yet they were aware of contextual targeting.\u0000 Our results identify mismatches between participants' mental models and current approaches for providing users with notice and choice about OBA. Participants misinterpreted icons intended to notify them about behavioral targeting and expected that they could turn to their browser or antivirus software to control OBA. Participants had strong concerns about data collection, and the majority of participants believed that advertisers collect personally identifiable information. They also misunderstood the role of advertising networks, basing their opinions of an advertising network on that company's non-advertising activities. Participants' attitudes towards OBA were complex and context-dependent. While many participants felt tailored advertising could benefit them, existing notice and choice mechanisms are not effectively reaching users.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115036628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 342
Correct horse battery staple: exploring the usability of system-assigned passphrases 正确的马电池主食:探索系统分配的密码的可用性
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335366
Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy M. Vidas, Lujo Bauer, Nicolas Christin, L. Cranor
Users tend to create passwords that are easy to guess, while system-assigned passwords tend to be hard to remember. Passphrases, space-delimited sets of natural language words, have been suggested as both secure and usable for decades. In a 1,476-participant online study, we explored the usability of 3- and 4-word system-assigned passphrases in comparison to system-assigned passwords composed of 5 to 6 random characters, and 8-character system-assigned pronounceable passwords. Contrary to expectations, system-assigned passphrases performed similarly to system-assigned passwords of similar entropy across the usability metrics we examined. Passphrases and passwords were forgotten at similar rates, led to similar levels of user difficulty and annoyance, and were both written down by a majority of participants. However, passphrases took significantly longer for participants to enter, and appear to require error-correction to counteract entry mistakes. Passphrase usability did not seem to increase when we shrunk the dictionary from which words were chosen, reduced the number of words in a passphrase, or allowed users to change the order of words.
用户倾向于创建易于猜测的密码,而系统分配的密码往往很难记住。密码短语是一组以空格分隔的自然语言单词,几十年来一直被认为既安全又可用。在一项1,476名参与者的在线研究中,我们探讨了3个和4个单词的系统分配密码与由5到6个随机字符组成的系统分配密码和8个字符的系统分配可发音密码的可用性。与预期相反,在我们检查的可用性指标中,系统分配的密码与熵相似的系统分配密码的表现相似。密码短语和密码被遗忘的比率相似,对用户造成的困难和烦恼程度相似,而且大多数参与者都记下来了。然而,参与者输入密码所需的时间要长得多,而且似乎需要纠错来抵消输入错误。当我们缩小选择单词的字典,减少密码短语中的单词数量,或者允许用户改变单词的顺序时,密码短语的可用性似乎并没有增加。
{"title":"Correct horse battery staple: exploring the usability of system-assigned passphrases","authors":"Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy M. Vidas, Lujo Bauer, Nicolas Christin, L. Cranor","doi":"10.1145/2335356.2335366","DOIUrl":"https://doi.org/10.1145/2335356.2335366","url":null,"abstract":"Users tend to create passwords that are easy to guess, while system-assigned passwords tend to be hard to remember. Passphrases, space-delimited sets of natural language words, have been suggested as both secure and usable for decades. In a 1,476-participant online study, we explored the usability of 3- and 4-word system-assigned passphrases in comparison to system-assigned passwords composed of 5 to 6 random characters, and 8-character system-assigned pronounceable passwords. Contrary to expectations, system-assigned passphrases performed similarly to system-assigned passwords of similar entropy across the usability metrics we examined. Passphrases and passwords were forgotten at similar rates, led to similar levels of user difficulty and annoyance, and were both written down by a majority of participants. However, passphrases took significantly longer for participants to enter, and appear to require error-correction to counteract entry mistakes. Passphrase usability did not seem to increase when we shrunk the dictionary from which words were chosen, reduced the number of words in a passphrase, or allowed users to change the order of words.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130311207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 146
Helping Johnny 2.0 to encrypt his Facebook conversations 帮约翰尼2.0加密他的脸书对话
Pub Date : 2012-07-11 DOI: 10.1145/2335356.2335371
S. Fahl, M. Harbach, T. Muders, Matthew Smith, U. Sander
Several billion Facebook messages are sent every day. While there are many solutions to email security whose usability has been extensively studied, little work has been done in the area of message security for Facebook and even less on the usability aspects in this area. To evaluate the need for such a mechanism, we conducted a screening study with 514 participants, which showed a clear desire to protect private messages on Facebook. We therefore proceeded to analyse the usability of existing approaches and extracted key design decisions for further evaluation. Based on this analysis, we conducted a laboratory study with 96 participants to analyse different usability aspects and requirements of a Facebook message encryption mechanism. Two key findings of our study are that automatic key management and key recovery capabilities are important features for such a mechanism. Following on from these studies, we designed and implemented a usable service-based encryption mechanism for Facebook conversations. In a final study with 15 participants, we analysed the usability of our solution. All participants were capable of successfully encrypting their Facebook conversations without error when using our service, and the mechanism was perceived as usable and useful. The results of our work suggest that in the context of the social web, new security/usability trade-offs can be explored to protect users more effectively.
Facebook每天发送数十亿条信息。虽然有许多电子邮件安全的解决方案,其可用性已经被广泛研究,但在Facebook的消息安全领域做的工作很少,在这一领域的可用性方面就更少了。为了评估这种机制的必要性,我们对514名参与者进行了一项筛选研究,这些参与者明显希望保护Facebook上的私人信息。因此,我们开始分析现有方法的可用性,并提取关键设计决策以供进一步评估。基于此分析,我们对96名参与者进行了一项实验室研究,以分析Facebook消息加密机制的不同可用性方面和需求。我们研究的两个主要发现是,自动密钥管理和密钥恢复能力是这种机制的重要特征。根据这些研究,我们为Facebook会话设计并实现了一个可用的基于服务的加密机制。在最后一项有15名参与者的研究中,我们分析了我们解决方案的可用性。当使用我们的服务时,所有参与者都能够成功地加密他们的Facebook对话,而不会出现错误,并且该机制被认为是可用的和有用的。我们的工作结果表明,在社交网络的背景下,可以探索新的安全性/可用性权衡,以更有效地保护用户。
{"title":"Helping Johnny 2.0 to encrypt his Facebook conversations","authors":"S. Fahl, M. Harbach, T. Muders, Matthew Smith, U. Sander","doi":"10.1145/2335356.2335371","DOIUrl":"https://doi.org/10.1145/2335356.2335371","url":null,"abstract":"Several billion Facebook messages are sent every day. While there are many solutions to email security whose usability has been extensively studied, little work has been done in the area of message security for Facebook and even less on the usability aspects in this area. To evaluate the need for such a mechanism, we conducted a screening study with 514 participants, which showed a clear desire to protect private messages on Facebook. We therefore proceeded to analyse the usability of existing approaches and extracted key design decisions for further evaluation. Based on this analysis, we conducted a laboratory study with 96 participants to analyse different usability aspects and requirements of a Facebook message encryption mechanism. Two key findings of our study are that automatic key management and key recovery capabilities are important features for such a mechanism. Following on from these studies, we designed and implemented a usable service-based encryption mechanism for Facebook conversations. In a final study with 15 participants, we analysed the usability of our solution. All participants were capable of successfully encrypting their Facebook conversations without error when using our service, and the mechanism was perceived as usable and useful. The results of our work suggest that in the context of the social web, new security/usability trade-offs can be explored to protect users more effectively.","PeriodicalId":273244,"journal":{"name":"Symposium On Usable Privacy and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125133476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
期刊
Symposium On Usable Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1