-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Bernard,

There are two areas where I'd love to see some research. The first is
the effect of provenance on perceptions of security: when deciding how
secure they believe a tool to be, how strongly are people influenced
by their knowledge of who created the tool, versus their knowledge of
how the tool works, or other factors?

The second area is how people reason about security boundaries - or to
put it another way, how people reason about the security properties of
data as it moves between devices, between locations and between
applications.

For example, if someone believes that Skype is in some sense "more
secure" than AIM, will that person treat files received over Skype
differently from files received over AIM? What concepts will they
refer to when explaining why they do or don't treat those files
differently?

Knowing more about how people reason about these issues would help
developers to design tools that actually have the properties people
think they have.

Cheers,
Michael

On 22/09/12 16:06, Bernard Tyers - ei8fdb wrote:
> Hi All,
> 
> I am currently researching ideas for my masters in human computer
> systems thesis. I am a mobile telecoms engineer by profession, but
> am interested in HCI, tools that help maintain your security,
> secure communications, and privacy concerns.
> 
> There have been some interesting threads here that have brought up
> some interesting questions for me: ∙ The thread discussing the
> usability of tools, such as cryptocat. How it was (originally) easy
> to use but may not have been as secure as possible. (NB: This is
> not a jab/poke at anybodies work, or an excuse to bring up any of
> the previous discussions about Cryptocat) ∙ The perception of tools
> which are easy to use but may not be secure, eg. Viber, whereas
> other tools are seen as secure, ∙ There are no shortcuts to being
> secure.
> 
> I am developing some ideas at the moment, which are mainly around
> mobile, privacy, security, encryption tools, people's use of these
> tools (and why some people don't use them), how to present
> information such as  possible interference with Internet users
> traffic.
> 
> I would be very interested to hear from anyone (on or off-list) who
> has any suggestions, "I'd love to know XYZ" questions, or projects
> that are currently on-going that may benefit from a MSc level
> research project into the intersecting topics mentioned above. I am
> open to discussing any ideas, so please let me know if you have an
> idea.
> 
> thanks in advance, Bernard
> 
> -------------------------------------- Bernard / bluboxthief /
> ei8fdb
> 
> IO91XM / www.ei8fdb.org
> 
> -- Unsubscribe, change to digest, or change password at:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
> 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJQXdw2AAoJEBEET9GfxSfM6OYIALdFW4DhU70nWb0OrqxkvqKa
WBbHtAFooKKYVwn1l7K72KyxHDvcq7bpvL8yZQuv3InF0fs0CDqf90op6eIpgFZp
ViqsP4rtSDWjFdn+S2NZvscyPCs6uEU8et0kPo3Q4gYUBD8orbsa6M+6Plu+tso8
QPI16gm6e2AHeAzXvyUZGcpdDpgOgdBbWP6SJHk21Bv6/wsqilMIRh4WXEZeo/Oh
e1Lx7SAOqqT3Dp4/V2Qwy1AntecDcKHFFUK87zNPnIvDZMQ7YNWUG0kaPSga3ux5
BVf6y4tlrweqvR7sGi9vi+tY0VNPYYEtqjRDnVNQrJ3FI6pcfm9goKPkcMBTGwU=
=xh9r
-----END PGP SIGNATURE-----
--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to