Refine
Year
Publication Type
- Article (1435)
- Lecture (870)
- Conference Proceeding (640)
- Part of a Book (535)
- Book (133)
- Report (85)
- Bachelor Thesis (31)
- Contribution to a Periodical (27)
- Master's Thesis (23)
- Participation in a Norm (DIN, RFC etc.) (12)
- Part of Periodical (6)
- Working Paper (5)
- Review (3)
- Other (1)
- Periodical (1)
- Preprint (1)
- Sound (1)
Language
- English (3809) (remove)
Keywords
- Humans (15)
- Child (13)
- Female (12)
- Male (12)
- Urban (11)
- Adolescent (10)
- Adult (10)
- Wohnraum (9)
- Middle Aged (8)
- Surveys and Questionnaires (7)
Faculty
- Wirtschaft (MSB) (739)
- Chemieingenieurwesen (CIW) (733)
- Physikingenieurwesen (PHY) (518)
- Oecotrophologie · Facility Management (OEF) (359)
- Energie · Gebäude · Umwelt (EGU) (229)
- Sozialwesen (SW) (225)
- Elektrotechnik und Informatik (ETI) (197)
- Gesundheit (MDH) (173)
- Bauingenieurwesen (BAU) (169)
- Maschinenbau (MB) (156)
"Deluge of Ducks"
(1998)
"Finding the right Partner", Präsentation auf der Konferenz PROTON am 31.01.2008 in Turin, Italien
(2008)
OpenPGP is one of the two major standards for end-to-end email security. Several studies showed that serious usability issues exist with tools implementing this standard. However, a widespread assumption is that expert users can handle these tools and detect signature spoofing attacks. We present a user study investigating expert users' strategies to detect signature spoofing attacks in Thunderbird. We observed 25 expert users while they classified eight emails as either having a legitimate signature or not. Studying expert users explicitly gives us an upper bound of attack detection rates of all users dealing with PGP signatures. 52% of participants fell for at least one out of four signature spoofing attacks. Overall, participants did not have an established strategy for evaluating email signature legitimacy. We observed our participants apply 23 different types of checks when inspecting signed emails, but only 8 of these checks tended to be useful in identifying the spoofed or invalid signatures. In performing their checks, participants were frequently startled, confused, or annoyed with the user interface, which they found supported them little. All these results paint a clear picture: Even expert users struggle to verify email signatures, usability issues in email security are not limited to novice users, and developers may need proper guidance on implementing email signature GUIs correctly.
Male juveniles in segregated poor neighbourhoods are at increased risk of violence. The code of the street approach is commonly used to understand the context informing street violence in such marginalized spaces, but the concept is mainly used in Western countries, especially in African American communities in the US. This study investigates whether the code of the street is also applicable to the largest Roma neighbourhood in Europe, located in Bulgaria, through guided interviews with male juveniles. The results show that some elements of the code work are applicable in this space, but clear differences also emerge. These findings affect the generalizability of the approach and the understanding of street violence.