User-visible cryptography in email and web scenarios
نویسندگان
چکیده
Purpose To classify different types of “user-visible cryptography” and evaluate the value of user-visible cryptographic mechanisms in typical email and web scenarios for non-expert IT users. Design/methodology/approach We review the existing literature, then identify user stories typical to our users of interest. We analyse the risks, mitigations of risks and the limits of those mitigations in the user stories. Findings The scenarios identified suggest that background, opportunistic encryption has value, but more explicit, user-visible cryptographic mechanisms do not provide any further mitigation. Other mechanisms beyond technological mitigations provide the required mitigation for our users. Research limitations/implications Further work should be carried out on the trust issues with trusted third parties, as they are intrinsic to global, automated cryptographic mechanisms. We suggest that deployed systems should rely on automation rather than exp licit user involvement; further work on how best to involve users effectively remains valuable. Practical implications Deployed systems should rely on automation rather than explicit user dialogues. This follows from recognised aspects of user behaviour, such as ignoring dialogues and unconsciously making a holistic assessment of risk that is mostly mitigated by social factors. Social implications The user populations concerned rely significantly on the existing legal and social infrastructure to mitigate some risks, such as those associated with e-commerce. Guarantees from third parties and the existence of fallback procedures improve user confidence. Originality/value This work uses user stories as a basis for a holistic review of the issues surrounding the use of cryptography. We concentrate on a relatively large population (non-expert IT users) carrying out typical tasks (web and email).
منابع مشابه
The Value of User-Visible Internet Cryptography
Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic ...
متن کاملوب مرئی و نامرئی: تجزیه و تحلیل استفاده از محیط وب بر اساس مدل ایدهآل تیپ ماکس وبر
Using the Web has become ubiquitous and an indispensable part of scientists’ daily life. Although there are many studies dealing with the use of the Web, few studies have focused on how different user groups including scientists make use of visible and invisible parts of the Web for educational and research purposes. This article first introduces the visible and invisible parts of the Web, and ...
متن کاملData Extraction using Content-Based Handles
In this paper, we present an approach and a visual tool, called HWrap (Handle Based Wrapper), for creating web wrappers to extract data records from web pages. In our approach, we mainly rely on the visible page content to identify data regions on a web page. In our extraction algorithm, we inspired by the way a human user scans the page content for specific data. In particular, we use text fea...
متن کاملWeb pages ranking algorithm based on reinforcement learning and user feedback
The main challenge of a search engine is ranking web documents to provide the best response to a user`s query. Despite the huge number of the extracted results for user`s query, only a small number of the first results are examined by users; therefore, the insertion of the related results in the first ranks is of great importance. In this paper, a ranking algorithm based on the reinforcement le...
متن کاملUse of Semantic Similarity and Web Usage Mining to Alleviate the Drawbacks of User-Based Collaborative Filtering Recommender Systems
One of the most famous methods for recommendation is user-based Collaborative Filtering (CF). This system compares active user’s items rating with historical rating records of other users to find similar users and recommending items which seems interesting to these similar users and have not been rated by the active user. As a way of computing recommendations, the ultimate goal of the user-ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. & Comput. Security
دوره 23 شماره
صفحات -
تاریخ انتشار 2015