首页 > 最新文献

2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)最新文献

英文 中文
Controlled data sharing in E-health 电子保健中的受控数据共享
Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059251
I. Matteucci, P. Mori, M. Petrocchi, Luca Wiegand
In the last few years, the necessity of having documents in electronic format has been growing over and over. This phenomenon affects also healthcare organizations that have adopted a new model for managing clinical information based on so called Electronic Patient Records. On the one hand, the introduction of such models allows to easily share information among several and widespread healthcare organizations. On the other hand, this arises several questions, like how to guarantee security requirements as, e.g., confidentiality, integrity, and privacy of the information shared. In this paper, we present a formal framework for specifying and analysing policies that regulate the information sharing, in such a way that the security requirements of the author of the policy are satisfied. In particular, we consider a set of authorization, obligation, and prohibition clauses aiming at preserving confidentiality, integrity, and privacy of the clinical data of a patient.
在过去的几年里,电子格式文档的需求一直在不断增长。这种现象也影响到采用了基于所谓的电子病历管理临床信息的新模型的医疗保健组织。一方面,这些模型的引入允许在多个广泛的医疗保健组织之间轻松共享信息。另一方面,这会产生几个问题,比如如何保证安全需求,例如,共享信息的机密性、完整性和隐私性。在本文中,我们提出了一个正式的框架,用于指定和分析规范信息共享的策略,以满足策略作者的安全需求。特别是,我们考虑了一组授权、义务和禁止条款,旨在保护患者临床数据的机密性、完整性和隐私性。
{"title":"Controlled data sharing in E-health","authors":"I. Matteucci, P. Mori, M. Petrocchi, Luca Wiegand","doi":"10.1109/STAST.2011.6059251","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059251","url":null,"abstract":"In the last few years, the necessity of having documents in electronic format has been growing over and over. This phenomenon affects also healthcare organizations that have adopted a new model for managing clinical information based on so called Electronic Patient Records. On the one hand, the introduction of such models allows to easily share information among several and widespread healthcare organizations. On the other hand, this arises several questions, like how to guarantee security requirements as, e.g., confidentiality, integrity, and privacy of the information shared. In this paper, we present a formal framework for specifying and analysing policies that regulate the information sharing, in such a way that the security requirements of the author of the policy are satisfied. In particular, we consider a set of authorization, obligation, and prohibition clauses aiming at preserving confidentiality, integrity, and privacy of the clinical data of a patient.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117151122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Trustworthy and effective communication of cybersecurity risks: A review 网络安全风险的可信与有效沟通:综述
Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059257
Jason R. C. Nurse, S. Creese, M. Goldsmith, K. Lamberts
Slowly but surely, academia and industry are fully accepting the importance of the human element as it pertains to achieving security and trust. Undoubtedly, one of the main motivations for this is the increase in attacks (e.g., social engineering and phishing) which exploit humans and exemplify why many authors regard them as the weakest link in the security chain. As research in the socio-technical security and trust fields gains momentum, it is crucial to intermittently pause and reflect on their progress while also considering related domains to determine whether there are any established principles which may be transferred. Comparison of the states-of-the-arts may assist in planning work going forward and identifying useful future directions for the less mature socio-technical field. This paper seeks to fulfil several of these goals, particularly as they relate to the emerging cybersecurity-risk communication domain. The literature reviews which we conduct here are beneficial and indeed noteworthy as they pull together a number of the key aspects which may affect the trustworthiness and effectiveness of communications on cybersecurity risks. In particular, we draw on information-trustworthiness research and the established field of risk communication. An appreciation of these aspects and precepts is imperative if systems are to be designed that play to individuals' strengths and assist them in maintaining security and protecting their applications and information.
学术界和工业界正在缓慢但肯定地完全接受人的因素在实现安全和信任方面的重要性。毫无疑问,造成这种情况的主要原因之一是攻击的增加(例如,社会工程和网络钓鱼),这些攻击利用人类,并举例说明为什么许多作者认为它们是安全链中最薄弱的环节。随着社会技术安全和信任领域的研究取得势头,在考虑相关领域以确定是否存在可转移的既定原则的同时,间歇性地暂停和反思其进展至关重要。比较最先进的技术可能有助于规划今后的工作,并为不太成熟的社会技术领域确定有用的未来方向。本文试图实现其中的几个目标,特别是因为它们与新兴的网络安全风险通信领域有关。我们在这里进行的文献综述是有益的,确实值得注意,因为它们汇集了许多可能影响网络安全风险通信的可信度和有效性的关键方面。特别是,我们借鉴了信息可信度研究和已建立的风险沟通领域。如果要设计能够发挥个人优势并帮助他们维护安全和保护其应用程序和信息的系统,就必须了解这些方面和规则。
{"title":"Trustworthy and effective communication of cybersecurity risks: A review","authors":"Jason R. C. Nurse, S. Creese, M. Goldsmith, K. Lamberts","doi":"10.1109/STAST.2011.6059257","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059257","url":null,"abstract":"Slowly but surely, academia and industry are fully accepting the importance of the human element as it pertains to achieving security and trust. Undoubtedly, one of the main motivations for this is the increase in attacks (e.g., social engineering and phishing) which exploit humans and exemplify why many authors regard them as the weakest link in the security chain. As research in the socio-technical security and trust fields gains momentum, it is crucial to intermittently pause and reflect on their progress while also considering related domains to determine whether there are any established principles which may be transferred. Comparison of the states-of-the-arts may assist in planning work going forward and identifying useful future directions for the less mature socio-technical field. This paper seeks to fulfil several of these goals, particularly as they relate to the emerging cybersecurity-risk communication domain. The literature reviews which we conduct here are beneficial and indeed noteworthy as they pull together a number of the key aspects which may affect the trustworthiness and effectiveness of communications on cybersecurity risks. In particular, we draw on information-trustworthiness research and the established field of risk communication. An appreciation of these aspects and precepts is imperative if systems are to be designed that play to individuals' strengths and assist them in maintaining security and protecting their applications and information.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Security requirements engineering via commitments 通过承诺进行安全需求工程
Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059249
F. Dalpiaz, E. Paja, P. Giorgini
Security Requirements Engineering (SRE) is concerned with the elicitation of security needs and the specification of security requirements of the system-to-be. Current approaches to SRE either express stakeholders' needs via high-level organisational abstractions that are hard to map to system design, or specify only technical security requirements. In this paper, we introduce SecCo, an SRE framework that starts with goal-oriented modelling of the security needs and derives security requirements from such needs. Importantly, SecCo relates security requirements to the interaction among actors. Security requirements are specified as social commitments — promises with contractual validity from one actor to another — that define constraints on the way actors can interact. These commitments shall be implemented by the system-to-be.
安全需求工程(SRE)关注的是未来系统的安全需求的引出和安全需求的规范。当前的SRE方法要么通过难以映射到系统设计的高级组织抽象来表达涉众的需求,要么只指定技术安全需求。在本文中,我们介绍SecCo,这是一个SRE框架,它从面向目标的安全需求建模开始,并从这些需求中派生出安全需求。重要的是,SecCo将安全需求与参与者之间的交互联系起来。安全需求被指定为社会承诺——从一个参与者到另一个参与者之间具有契约有效性的承诺——它定义了参与者交互方式的约束。这些承诺将由未来的系统执行。
{"title":"Security requirements engineering via commitments","authors":"F. Dalpiaz, E. Paja, P. Giorgini","doi":"10.1109/STAST.2011.6059249","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059249","url":null,"abstract":"Security Requirements Engineering (SRE) is concerned with the elicitation of security needs and the specification of security requirements of the system-to-be. Current approaches to SRE either express stakeholders' needs via high-level organisational abstractions that are hard to map to system design, or specify only technical security requirements. In this paper, we introduce SecCo, an SRE framework that starts with goal-oriented modelling of the security needs and derives security requirements from such needs. Importantly, SecCo relates security requirements to the interaction among actors. Security requirements are specified as social commitments — promises with contractual validity from one actor to another — that define constraints on the way actors can interact. These commitments shall be implemented by the system-to-be.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132642090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
User study of the improved Helios voting system interfaces 用户研究改进的Helios投票系统界面
Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059254
Fatih Karayumak, M. Kauer, M. Olembo, Tobias Volk, M. Volkamer
There is increasing interest in cryptographic verifiability in remote electronic voting schemes. Helios is one example of an open-source implementation. In previous work, we proposed an improved version of the original Helios interface in version 3.1 for vote casting and individual verifiability. We now test this interface in a mock mayoral election set up with 34 users. Users are given instructions and fill out questionnaires before and after the vote casting process. Data on mouse movements and time is collected and a modified helmet with eye tracking lenses is used to capture eye movement data. The study shows that the interface is easy to use while people have difficulty understanding the motivation for and the concept of verifiability.
人们对远程电子投票方案中的密码可验证性越来越感兴趣。Helios是开源实现的一个例子。在之前的工作中,我们在版本3.1中提出了原始Helios接口的改进版本,用于投票和个人验证。现在,我们在一个有34个用户的模拟市长选举中测试这个界面。在投票过程前后,用户会得到指示并填写调查问卷。收集鼠标移动和时间的数据,并使用带有眼动追踪镜头的改进头盔来捕获眼动数据。研究表明,界面易于使用,但人们难以理解可验证性的动机和概念。
{"title":"User study of the improved Helios voting system interfaces","authors":"Fatih Karayumak, M. Kauer, M. Olembo, Tobias Volk, M. Volkamer","doi":"10.1109/STAST.2011.6059254","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059254","url":null,"abstract":"There is increasing interest in cryptographic verifiability in remote electronic voting schemes. Helios is one example of an open-source implementation. In previous work, we proposed an improved version of the original Helios interface in version 3.1 for vote casting and individual verifiability. We now test this interface in a mock mayoral election set up with 34 users. Users are given instructions and fill out questionnaires before and after the vote casting process. Data on mouse movements and time is collected and a modified helmet with eye tracking lenses is used to capture eye movement data. The study shows that the interface is easy to use while people have difficulty understanding the motivation for and the concept of verifiability.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128003283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Information security as organizational power: A framework for re-thinking security policies 作为组织权力的信息安全:重新思考安全策略的框架
Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059250
P. Inglesant, M. Sasse
Successful enforcement of information security requires an understanding of a complex interplay of social and technological forces. Drawing on socio-technical literature to develop an analytical framework, we examine the relationship between security policies and power in organizations. We use our framework to study three examples of security policy from a large empirical study n an international company. Each example highlights a different aspect of our framework. Our results, from in-depth interviews with 55 staff members at all levels, show that there is often non-compliance in the detail of organizational information security policies; this is not willful but is in response to shortcomings in the policy and to meet business needs. We conclude by linking our findings to recent research on the institutional economics of information security. We suggest ways in which our framework can be used by organizational decision-makers to review and re-think existing security policies.
信息安全的成功实施需要理解社会和技术力量之间复杂的相互作用。利用社会技术文献来开发一个分析框架,我们研究了安全政策和组织权力之间的关系。我们使用我们的框架来研究来自一家国际公司的大型实证研究的三个安全策略示例。每个示例都突出了框架的不同方面。我们对55名各级工作人员进行了深入访谈,结果表明,在组织信息安全政策的细节上经常存在不合规的情况;这不是故意的,而是对政策缺陷的回应,也是为了满足业务需求。最后,我们将我们的发现与最近关于信息安全制度经济学的研究联系起来。我们建议组织决策者可以使用我们的框架来审查和重新考虑现有的安全策略。
{"title":"Information security as organizational power: A framework for re-thinking security policies","authors":"P. Inglesant, M. Sasse","doi":"10.1109/STAST.2011.6059250","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059250","url":null,"abstract":"Successful enforcement of information security requires an understanding of a complex interplay of social and technological forces. Drawing on socio-technical literature to develop an analytical framework, we examine the relationship between security policies and power in organizations. We use our framework to study three examples of security policy from a large empirical study n an international company. Each example highlights a different aspect of our framework. Our results, from in-depth interviews with 55 staff members at all levels, show that there is often non-compliance in the detail of organizational information security policies; this is not willful but is in response to shortcomings in the policy and to meet business needs. We conclude by linking our findings to recent research on the institutional economics of information security. We suggest ways in which our framework can be used by organizational decision-makers to review and re-think existing security policies.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130944657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On-line trust perception: What really matters 在线信任感知:真正重要的是什么
Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059256
Elisa Costante, J. D. Hartog, M. Petkovic
Trust is an essential ingredient in our daily activities. The fact that these activities are increasingly carried out using the large number of available services on the Internet makes it necessary to understand how users perceive trust in the online environment. A wide body of literature concerning trust perception and ways to model it already exists. A trust perception model generally lists a set of factors influencing a person trusting another person, a computer, or a website. Different models define different set of factors, but a single unifying model, applicable to multiple scenarios in different settings, is still missing. Moreover, there are no conclusions on the importance each factor has on trust perception. In this paper, we review the existing literature and provide a general trust perception model, which is able to measure the trustworthiness of a website. Such a model takes into account a comprehensive set of trust factors, ranking them based on their importance, and can be easily adapted to different application domains. A user study has been used to determine the importance, or weight, of each factor. The results of the study show evidence that such weight differs from one application domain (e.g. e-banking or e-health) to another. We also demonstrate that the weight of certain factors is related to the users knowledge in the IT Security field. This paper constitutes a first step towards the ability to measure the trustworthiness of a website, helping developers to create more trustworthy websites, and users to make their trust decisions when using on-line services.
信任是我们日常生活的重要组成部分。这些活动越来越多地利用互联网上的大量可用服务进行,因此有必要了解用户如何看待在线环境中的信任。关于信任感知及其建模方法的大量文献已经存在。信任感知模型通常列出一系列影响一个人信任另一个人、一台电脑或一个网站的因素。不同的模型定义了不同的一组因素,但仍然缺乏一个统一的模型,适用于不同设置的多种场景。此外,各因素对信任感知的重要程度尚无定论。在本文中,我们回顾了现有的文献,并提供了一个通用的信任感知模型,该模型能够衡量网站的可信度。这样的模型考虑了一组全面的信任因素,根据它们的重要性对它们进行排序,并且可以很容易地适应不同的应用领域。用户研究已用于确定每个因素的重要性或权重。研究结果表明,这种权重在不同的应用领域(如电子银行或电子保健)是不同的。我们还证明了某些因素的权重与IT安全领域的用户知识有关。本文是衡量网站可信度的第一步,帮助开发人员创建更值得信赖的网站,并帮助用户在使用在线服务时做出信任决策。
{"title":"On-line trust perception: What really matters","authors":"Elisa Costante, J. D. Hartog, M. Petkovic","doi":"10.1109/STAST.2011.6059256","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059256","url":null,"abstract":"Trust is an essential ingredient in our daily activities. The fact that these activities are increasingly carried out using the large number of available services on the Internet makes it necessary to understand how users perceive trust in the online environment. A wide body of literature concerning trust perception and ways to model it already exists. A trust perception model generally lists a set of factors influencing a person trusting another person, a computer, or a website. Different models define different set of factors, but a single unifying model, applicable to multiple scenarios in different settings, is still missing. Moreover, there are no conclusions on the importance each factor has on trust perception. In this paper, we review the existing literature and provide a general trust perception model, which is able to measure the trustworthiness of a website. Such a model takes into account a comprehensive set of trust factors, ranking them based on their importance, and can be easily adapted to different application domains. A user study has been used to determine the importance, or weight, of each factor. The results of the study show evidence that such weight differs from one application domain (e.g. e-banking or e-health) to another. We also demonstrate that the weight of certain factors is related to the users knowledge in the IT Security field. This paper constitutes a first step towards the ability to measure the trustworthiness of a website, helping developers to create more trustworthy websites, and users to make their trust decisions when using on-line services.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
An approach to measure effectiveness of control for risk analysis with game theory 用博弈论衡量风险分析控制有效性的方法
Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059252
Lisa Rajbhandari, E. Snekkenes
Security managers are facing problems choosing effective controls (countermeasures), as there is large number of controls at their disposal. Although the existing standards and methods provide guidance, they are not sufficiently comprehensive when it comes to deciding what attributes to look for and how to use them for determining the effectiveness of controls. The purpose of this paper is twofold: first we determine the attributes of controls and its measurement functions, in order to measure its effectiveness by means of Analytic Hierarchy Process (AHP). Secondly, we show how control metrics can be used by the analyst to make deployment decisions by means of Risk Analysis Using Game Theory (RAUGT). The approach is further validated by using a case study between a system owner who wants to determine the effectiveness of using the Password Testing System (PTS) to raise the bar for the attacker.
安全管理人员面临着选择有效控制(对策)的问题,因为有大量的控制可供他们使用。尽管现有的标准和方法提供了指导,但是在决定寻找哪些属性以及如何使用它们来确定控制的有效性时,它们还不够全面。本文的目的有两个:首先,我们确定了控制的属性及其度量函数,以便用层次分析法(AHP)来度量控制的有效性。其次,我们展示了分析师如何使用控制指标通过使用博弈论的风险分析(RAUGT)来做出部署决策。通过使用一个系统所有者之间的案例研究,进一步验证了该方法,该系统所有者希望确定使用密码测试系统(PTS)提高攻击者门槛的有效性。
{"title":"An approach to measure effectiveness of control for risk analysis with game theory","authors":"Lisa Rajbhandari, E. Snekkenes","doi":"10.1109/STAST.2011.6059252","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059252","url":null,"abstract":"Security managers are facing problems choosing effective controls (countermeasures), as there is large number of controls at their disposal. Although the existing standards and methods provide guidance, they are not sufficiently comprehensive when it comes to deciding what attributes to look for and how to use them for determining the effectiveness of controls. The purpose of this paper is twofold: first we determine the attributes of controls and its measurement functions, in order to measure its effectiveness by means of Analytic Hierarchy Process (AHP). Secondly, we show how control metrics can be used by the analyst to make deployment decisions by means of Risk Analysis Using Game Theory (RAUGT). The approach is further validated by using a case study between a system owner who wants to determine the effectiveness of using the Password Testing System (PTS) to raise the bar for the attacker.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117064510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Camera use in the public domain: Towards a ”Big Sister” approach 相机在公共领域的使用:走向“大姐”的方式
Pub Date : 2011-11-18 DOI: 10.1109/STAST.2011.6059253
M. V. D. Sar, I. Mulder, Sunil Choenni
The use of cameras is growing: not only personal computers and laptops are standard equipped with a camera, but also the public domain is increasingly equipped with cameras. Today's camera is not merely a pair of eyes. A surveillance camera can see much more than a single person can do. The rapid proliferation of camera technologies makes today's cameras beyond human vision. Although these cameras have a primarily goal to enforce public safety, the dark side of camera surveillance is often discussed. One could argue that such camera appearance affects human behavior. The current article reports how cameras influence people's behavior. Our findings are based on a set of exploratory studies. In line with other studies, we find that cameras do influence the behavior of people, and more surprisingly, they evoke emotions. On the basis of our findings, we discuss the potentials and pitfalls of the use of cameras in the public domain and propose a ‘Big Sister’ design approach to enhance public safety that brings value to the citizens and enlightens the dark side of camera surveillance.
摄像头的使用正在增长:不仅个人电脑和笔记本电脑标准配备了摄像头,而且公共领域也越来越多地配备了摄像头。今天的照相机不仅仅是一双眼睛。监控摄像头能看到的远比一个人能看到的多。相机技术的快速发展使得今天的相机超越了人类的视觉。虽然这些摄像头的主要目的是加强公共安全,但摄像头监控的阴暗面经常被讨论。有人可能会说,这样的镜头会影响人类的行为。这篇文章报道了照相机如何影响人们的行为。我们的发现是基于一系列探索性研究。与其他研究一致,我们发现相机确实会影响人们的行为,更令人惊讶的是,它们会唤起情感。基于我们的研究结果,我们讨论了在公共领域使用摄像头的潜力和缺陷,并提出了一种“大姐”设计方法,以增强公共安全,为公民带来价值,并揭示摄像头监控的阴暗面。
{"title":"Camera use in the public domain: Towards a ”Big Sister” approach","authors":"M. V. D. Sar, I. Mulder, Sunil Choenni","doi":"10.1109/STAST.2011.6059253","DOIUrl":"https://doi.org/10.1109/STAST.2011.6059253","url":null,"abstract":"The use of cameras is growing: not only personal computers and laptops are standard equipped with a camera, but also the public domain is increasingly equipped with cameras. Today's camera is not merely a pair of eyes. A surveillance camera can see much more than a single person can do. The rapid proliferation of camera technologies makes today's cameras beyond human vision. Although these cameras have a primarily goal to enforce public safety, the dark side of camera surveillance is often discussed. One could argue that such camera appearance affects human behavior. The current article reports how cameras influence people's behavior. Our findings are based on a set of exploratory studies. In line with other studies, we find that cameras do influence the behavior of people, and more surprisingly, they evoke emotions. On the basis of our findings, we discuss the potentials and pitfalls of the use of cameras in the public domain and propose a ‘Big Sister’ design approach to enhance public safety that brings value to the citizens and enlightens the dark side of camera surveillance.","PeriodicalId":293851,"journal":{"name":"2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125165279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1