Proceedings 2014 Workshop on Usable Security 2014
DOI: 10.14722/usec.2014.23030
|View full text |Cite
|
Sign up to set email alerts
|

Spiny CACTOS: OSN Users Attitudes and Perceptions Towards Cryptographic Access Control Tools

Abstract: Abstract-Cryptographic access control tools for online social networks (CACTOS) allow users to enforce their privacy settings online without relying on the social network provider or any other third party. Many such tools have been proposed in the literature, some of them implemented and currently publicly available, and yet they have seen poor or no adoption at all. In this paper we investigate which obstacles may be hindering the adoption of these tools. To this end, we perform a user study to inquire users … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…On this point, we have to bear in mind that the low users' acceptance of encryption [38] is even worse when considering the broader spectrum of PET [30]. Therefore, it is highly advisable to acknowledge and learn from recent contributions on creating usable authentication procedures [24] and enforcing privacy settings online [5]. In fact, this last concern is of paramount importance in online services, since the related providers collect and manage PII whereas the user generally has only partial knowledge about the proper and legitimate use of his or her data [28].…”
Section: Challenge 6: Usable Identity Management Systemsmentioning
confidence: 99%
“…On this point, we have to bear in mind that the low users' acceptance of encryption [38] is even worse when considering the broader spectrum of PET [30]. Therefore, it is highly advisable to acknowledge and learn from recent contributions on creating usable authentication procedures [24] and enforcing privacy settings online [5]. In fact, this last concern is of paramount importance in online services, since the related providers collect and manage PII whereas the user generally has only partial knowledge about the proper and legitimate use of his or her data [28].…”
Section: Challenge 6: Usable Identity Management Systemsmentioning
confidence: 99%
“…Unfortunately this feature does not help with the confidentiality of communications once access to the account is gained or if messages are accessed through the account of one of the other correspondents engaged in conversation. To guarantee confidentiality of the messages themselves, users may turn to the use of Cryptography-Based Access Control Tools (Balsa, Brandimarte, Acquisti, Diaz and Gürses, 2014). The use of such tools can enable a user to take back some control over the level of confidentiality of their content, to the extent that a platform like Facebook, or potential opponent who gains access to a Facebook account, would no longer have the ability to read one user's messages to another.…”
Section: Fcj-195 201mentioning
confidence: 99%
“…This is very important considering the diversity of existing PETs, fulfilling partial privacy requirements, thus requiring the user to apply several tools for protection (Vemou and Karyda, 2013). Also, impact on performance of everyday SNS operations is important, as users wish to protect privacy without experiencing low latency of the service (Balsa et al, 2014).…”
Section: 21mentioning
confidence: 99%
“…For instance, users of Safe secure and private Facebook messages need to manage encryption keys, whereas to use MyPermissions one needs to be familiar with managing browser extensions. As requirements for technical expertise can discourage users from employing PETs, Balsa et. al.…”
Section: 21mentioning
confidence: 99%
See 1 more Smart Citation