Self-identified experts lost on the interwebs
Contribuinte(s) |
Bishop, Matt Shannon, Greg |
---|---|
Data(s) |
2012
|
Resumo |
Security cues found in web browsers are meant to alert users to potential online threats, yet many studies demonstrate that security indicators are largely ineffective in this regard. Those studies have depended upon self-reporting of subjects' use or aggregate experimentation that correlate responses to sites with and without indicators. We report on a laboratory experiment using eye-tracking to follow the behavior of self-identified computer experts as they share information across popular social media websites. The use of eye-tracking equipment allows us to explore possible behavioral differences in the way experts perceive web browser security cues, as opposed to non-experts. Unfortunately, due to the use of self-identified experts, technological issues with the setup, and demographic anomalies, our results are inconclusive. We describe our initial experimental design, lessons learned in our experimentation, and provide a set of steps for others to follow in implementing experiments using unfamiliar technologies, eye-tracking specifically, subjects with different experience with the laboratory tasks, as well as individuals with varying security expertise. We also discuss recruitment and how our design will address the inherent uncertainties in recruitment, as opposed to design for an ideal population. Some of these modifications are generalizable, together they will allow us to run a larger 2x2 study, rather than a study of only experts using two different single sign-on systems. |
Formato |
application/pdf |
Identificador | |
Publicador |
ACM |
Relação |
http://eprints.qut.edu.au/54165/1/54165A.pdf DOI:10.1145/2379616.2379623 Kelley, Timothy, Camp, L. Jean, Lien, Suzanne, & Stebila, Douglas (2012) Self-identified experts lost on the interwebs. In Bishop, Matt & Shannon, Greg (Eds.) Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results (LASER 2012), ACM, Arlington, Virginia, pp. 47-54. |
Direitos |
Copyright 2012 ACM This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in LASER '12 Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results, Pages 47-54, DOI: 10.1145/2379616.2379623 |
Fonte |
School of Electrical Engineering & Computer Science; Institute for Future Environments; Science & Engineering Faculty |
Palavras-Chave | #080505 Web Technologies (excl. Web Search) #080602 Computer-Human Interaction |
Tipo |
Conference Paper |