Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Ideas for MSc research into HCI, security tools, and privacy.

Bernard Tyers - ei8fdb ei8fdb at ei8fdb.org
Sat Sep 22 08:56:50 PDT 2012


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Michael,

Thank you for replying.

On 22 Sep 2012, at 16:41, Michael Rogers wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi Bernard,
> 
> There are two areas where I'd love to see some research. The first is
> the effect of provenance on perceptions of security: when deciding how
> secure they believe a tool to be, how strongly are people influenced
> by their knowledge of who created the tool, versus their knowledge of
> how the tool works, or other factors?

Yes, an excellent question. 

I have the feeling (backed up by observation) there is a similar approach by some people open source software, where the argument of 
"the developer is good so s/he wouldn't do anything bad".

> The second area is how people reason about security boundaries - or to
> put it another way, how people reason about the security properties of
> data as it moves between devices, between locations and between
> applications.

Again, an excellent question.

> For example, if someone believes that Skype is in some sense "more
> secure" than AIM, will that person treat files received over Skype
> differently from files received over AIM? What concepts will they
> refer to when explaining why they do or don't treat those files
> differently?
> 
> Knowing more about how people reason about these issues would help
> developers to design tools that actually have the properties people
> think they have.

Do you have any information or resources on this?

thanks,

Bernard


> Cheers,
> Michael
> 
> On 22/09/12 16:06, Bernard Tyers - ei8fdb wrote:
>> Hi All,
>> 
>> I am currently researching ideas for my masters in human computer
>> systems thesis. I am a mobile telecoms engineer by profession, but
>> am interested in HCI, tools that help maintain your security,
>> secure communications, and privacy concerns.
>> 
>> There have been some interesting threads here that have brought up
>> some interesting questions for me: ∙ The thread discussing the
>> usability of tools, such as cryptocat. How it was (originally) easy
>> to use but may not have been as secure as possible. (NB: This is
>> not a jab/poke at anybodies work, or an excuse to bring up any of
>> the previous discussions about Cryptocat) ∙ The perception of tools
>> which are easy to use but may not be secure, eg. Viber, whereas
>> other tools are seen as secure, ∙ There are no shortcuts to being
>> secure.
>> 
>> I am developing some ideas at the moment, which are mainly around
>> mobile, privacy, security, encryption tools, people's use of these
>> tools (and why some people don't use them), how to present
>> information such as  possible interference with Internet users
>> traffic.
>> 
>> I would be very interested to hear from anyone (on or off-list) who
>> has any suggestions, "I'd love to know XYZ" questions, or projects
>> that are currently on-going that may benefit from a MSc level
>> research project into the intersecting topics mentioned above. I am
>> open to discussing any ideas, so please let me know if you have an
>> idea.
>> 
>> thanks in advance, Bernard
>> 
>> -------------------------------------- Bernard / bluboxthief /
>> ei8fdb
>> 
>> IO91XM / www.ei8fdb.org
>> 
>> -- Unsubscribe, change to digest, or change password at:
>> https://mailman.stanford.edu/mailman/listinfo/liberationtech
>> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
> 
> iQEcBAEBAgAGBQJQXdw2AAoJEBEET9GfxSfM6OYIALdFW4DhU70nWb0OrqxkvqKa
> WBbHtAFooKKYVwn1l7K72KyxHDvcq7bpvL8yZQuv3InF0fs0CDqf90op6eIpgFZp
> ViqsP4rtSDWjFdn+S2NZvscyPCs6uEU8et0kPo3Q4gYUBD8orbsa6M+6Plu+tso8
> QPI16gm6e2AHeAzXvyUZGcpdDpgOgdBbWP6SJHk21Bv6/wsqilMIRh4WXEZeo/Oh
> e1Lx7SAOqqT3Dp4/V2Qwy1AntecDcKHFFUK87zNPnIvDZMQ7YNWUG0kaPSga3ux5
> BVf6y4tlrweqvR7sGi9vi+tY0VNPYYEtqjRDnVNQrJ3FI6pcfm9goKPkcMBTGwU=
> =xh9r
> -----END PGP SIGNATURE-----

- --------------------------------------
Bernard / bluboxthief / ei8fdb

IO91XM / www.ei8fdb.org

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org

iQEcBAEBAgAGBQJQXd/DAAoJENsz1IO7MIrrx4kH/RQ0T+Xy5i/ULPY02jkC2EcD
WjPJP0FAjiv+Wgne/uPcrbJ+Iu+mWhiYzasrS/HUybBbD1zs3So9TCB0ncMxUBox
+KMrowLXwg6FTCFfXethE9VGneZfWTs5eNDBlpHapq9PP4KuePBgMu7YGvfFr7LF
4M6Nlks7yXaDEatMz0Mo1o25b7yBzw/TgYaB1S86M+hZ0zI+hOy2r6Bf4aKyxqrY
H7AYrJmFewMJneFAAlqohBb79D0A955A2VqGKlV9kpghzEFaJZuP8lJe1KAefNtf
SLT9BS3+G2bfOYNrYqsolFrctFn+0+ZbbHz9CkfQvTjuIYeG3RcljYgTYbC0eC4=
=1JjU
-----END PGP SIGNATURE-----



More information about the liberationtech mailing list