Pub Date : 2012-07-16DOI: 10.1109/PST.2012.6297929
Kami Vaniea, Lujo Bauer, L. Cranor, M. Reiter
We take a detailed look at how users, while focusing on non-permission tasks, notice and fix access-control permission errors depending on where the access-control policy is spatially located on a photo-sharing website. The access-control policy was placed on an online photo-sharing website under the photo or album, on the sidebar, or on a separate settings page. We find that placing the access-control policy directly under photos and album thumbnails improves participants' ability to notice errors in their access-control settings without negatively impacting non-access-control tasks.
{"title":"Out of sight, out of mind: Effects of displaying access-control information near the item it controls","authors":"Kami Vaniea, Lujo Bauer, L. Cranor, M. Reiter","doi":"10.1109/PST.2012.6297929","DOIUrl":"https://doi.org/10.1109/PST.2012.6297929","url":null,"abstract":"We take a detailed look at how users, while focusing on non-permission tasks, notice and fix access-control permission errors depending on where the access-control policy is spatially located on a photo-sharing website. The access-control policy was placed on an online photo-sharing website under the photo or album, on the sidebar, or on a separate settings page. We find that placing the access-control policy directly under photos and album thumbnails improves participants' ability to notice errors in their access-control settings without negatively impacting non-access-control tasks.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133298669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-16DOI: 10.1109/PST.2012.6297946
Ivan Studnia, V. Nicomette, M. Kaâniche, E. Alata
This paper describes a data collection distributed platform composed of various high interaction honeypots deployed in different locations, along with our first analyses of this data. This deployment follows a previous experiment conducted with the same honeypot that was deployed at a single location (cf. [1]). The objective is to check if the results of our first experiment can be generalized.
{"title":"A distributed platform of high interaction honeypots and experimental results","authors":"Ivan Studnia, V. Nicomette, M. Kaâniche, E. Alata","doi":"10.1109/PST.2012.6297946","DOIUrl":"https://doi.org/10.1109/PST.2012.6297946","url":null,"abstract":"This paper describes a data collection distributed platform composed of various high interaction honeypots deployed in different locations, along with our first analyses of this data. This deployment follows a previous experiment conducted with the same honeypot that was deployed at a single location (cf. [1]). The objective is to check if the results of our first experiment can be generalized.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125506751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-16DOI: 10.1109/PST.2012.6297932
A. Basu, Natasha Dwyer, Stephen Naicken
Online dating is one domain, which would benefit from the application of computational trust. One of the problems with the application of traditional computational trust models, as identified in our previous work, is authenticity of information provided by parties which helps other users ascertain whether they want to go on dates. In this position paper, we suggest a solution: a concordance based framework for a game to be built into a online dating system. The game provokes users to provide spontaneous and thus more genuine data about themselves. The key feature of the game is the respect for privacy that supports and encourages the user to provide authentic information. Future work will comprise of implementation of the game and its user testing.
{"title":"A concordance framework for building trust evidences","authors":"A. Basu, Natasha Dwyer, Stephen Naicken","doi":"10.1109/PST.2012.6297932","DOIUrl":"https://doi.org/10.1109/PST.2012.6297932","url":null,"abstract":"Online dating is one domain, which would benefit from the application of computational trust. One of the problems with the application of traditional computational trust models, as identified in our previous work, is authenticity of information provided by parties which helps other users ascertain whether they want to go on dates. In this position paper, we suggest a solution: a concordance based framework for a game to be built into a online dating system. The game provokes users to provide spontaneous and thus more genuine data about themselves. The key feature of the game is the respect for privacy that supports and encourages the user to provide authentic information. Future work will comprise of implementation of the game and its user testing.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129250376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}