Dear all,
Just wanted to inform you about the latest article from the Cybernorms Research
Group; Larsson, Svensson de Kaminski: Online piracy, anonymity and social
change: Innovation through
deviance, which is using Merton’s strain theory in order to analyse the levels
of encrypted anonymity
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi All,
I am currently researching ideas for my masters in human computer systems
thesis. I am a mobile telecoms engineer by profession, but am interested in
HCI, tools that help maintain your security, secure communications, and privacy
concerns.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Bernard,
There are two areas where I'd love to see some research. The first is
the effect of provenance on perceptions of security: when deciding how
secure they believe a tool to be, how strongly are people influenced
by their knowledge of who
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 22/09/12 16:56, Bernard Tyers - ei8fdb wrote:
I have the feeling (backed up by observation) there is a similar
approach by some people open source software, where the argument of
the developer is good so s/he wouldn't do anything bad.