Bu kaydın yasal hükümlere uygun olmadığını düşünüyorsanız lütfen sayfa sonundaki Hata Bildir bağlantısını takip ederek bildirimde bulununuz. Kayıtlar ilgili üniversite yöneticileri tarafından eklenmektedir. Nadiren de olsa kayıtlarla ilgili hatalar oluşabilmektedir. MİTOS internet üzerindeki herhangi bir ödev sitesi değildir!

Implicit learning with certificate warning messages on SSL web pages: what are they teaching?

Oluşturulma Tarihi:

Niteleme Bilgileri

Tür: Makale

Yayınlanma Durumu: Yayınlanmış

Dosya Biçimi: Dosya Yok

Dil: İngilizce

Konu(lar): TEKNOLOJİ,

Yazar(lar): Bostan, Atila (Yazar),

Emeği Geçen(ler):


Yayın Adı: Security and Communication Networks Yayın Yeri: Newyork Sayı: 9 Cilt: 17 Yayınlandığı Sayfalar: 4295-4300


Dosya:
Dosya Yok

Anahtar Kelimeler




Özet

SSL-based web services are the most common technology in secure transactions on the Internet today. The security level of these services is inevitably related with that of digital certificates and user awareness. With the high number of nonconforming digital certificate usage, which eventually invokes warning messages on the Internet, users are implicitly forced to develop unsecure usage habits. In this study, we have studied the implicit learning effect of certificate warning messages on the SSL web pages. We have conducted two different experimental studies on university students and on instructors in IT departments. The results point to acquired indifference towards these warnings in users.


İçindekiler

SSL, messages, security level, 


Açıklamalar



Haklar



Notlar



KaynakçaSeger CA. Implicit learning. Psychological Bulletin 1994; Volume 115: pp.163-196. 1918 17Nightingale J. SSL information wants to be free. "http://blog.johnath.com/2009/01/" 21/ssl-information-wants-to-be-free, Latest Access Time for the website is May 17, 2016. 16Survey of the SSL Implementation of the Most Popular Web Sites, Trustworthy Internet Movement TIM, "https://www.trustworthyinternet.org/ssl-pulse", Latest Access Time for the website is 17 May 2016.Cormac Herley, So long, and no thanks for the externalities: the rational rejection of security advice by users, Proceedings of the 2009 workshop on New security paradigms workshop, September 08-11, 2009, Oxford, United Kingdom [doi>10.1145/1719030.1719050]15Rachna Dhamija , J. D. Tygar , Marti Hearst, Why phishing works, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 22-27, 2006, Montréal, Québec, Canada [doi>10.1145/1124772.1124861]1413Min Wu , Robert C. Miller , Simson L. Garfinkel, Do security toolbars actually prevent phishing attacks?, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 22-27, 2006, Montréal, Québec, Canada [doi>10.1145/1124772.1124863] 12Stuart E. Schechter , Rachna Dhamija , Andy Ozment , Ian Fischer, The Emperor's New Security Indicators, Proceedings of the 2007 IEEE Symposium on Security and Privacy, p.51-65, May 20-23, 2007 [doi>10.1109/SP.2007.35] 11Joshua Sunshine , Serge Egelman , Hazim Almuhimedi , Neha Atri , Lorrie Faith Cranor, Crying wolf: an empirical study of SSL warning effectiveness, Proceedings of the 18th conference on USENIX security symposium, p.399-416, August 10-14, 2009, Montreal, CanadaRyan West, The psychology of security, Communications of the ACM, v.51 n.4, p.34-40, April 2008 [doi>10.1145/1330311.1330320]10Amir Herzberg , Ahmad Jbara, Security and identification indicators for browsers against spoofing and phishing attacks, ACM Transactions on Internet Technology (TOIT), v.8 n.4, p.1-36, September 2008 [doi>10.1145/1391949.1391950]Jeffrey M. Stanton , Kathryn R. Stam , Paul Mastrangelo , Jeffrey Jolton, Analysis of end user security behaviors, Computers and Security, v.24 n.2, p.124-133, March, 2005 [doi>10.1016/j.cose.2004.07.001]98 7Joshua B. Gross , Mary Beth Rosson, Looking for trouble: understanding end-user security management, Proceedings of the 2007 symposium on Computer human interaction for the management of information technology, March 30-31, 2007, Cambridge, Massachusetts [doi>10.1145/1234772.1234786]6Kevin Palfreyman , Tom Rodden, A protocol for user awareness on the World Wide Web, Proceedings of the 1996 ACM conference on Computer supported cooperative work, p.130-139, November 16-20, 1996, Boston, Massachusetts, USA [doi>10.1145/240080.240236]CSI 2010-2011, 15th Annual CSI Computer Crime & Security Survey, Computer Security Institute, 2011, "http://reports.informationweek.com/cart/index/" downloadlink/id/7377, Latest Access Time for the website is 12 December 2013.5 14th Annual CSI Computer Crime & Security Survey, Comprehensive Addition, Computer Security Institute, 2009, "http://gocsi.com/purchase_survey" Latest Access Time for the website is 11 June 2011.4 3CSI Computer Crime & Security Survey2008, Computer Security Institute, "http://gocsi.com/sites/default/files/uploads/CSIsurvey2008.pdf", Latest Access Time for the website is 12 December 2013.John D'Arcy , Anat Hovav, Deterring internal information systems misuse, Communications of the ACM, v.50 n.10, p.113-117, October 2007 [doi>10.1145/1290958.1290971]2Anne Adams , Martina Angela Sasse, Users are not the enemy, Communications of the ACM, v.42 n.12, p.40-46, Dec. 1999 [doi>10.1145/322796.322806]Reber AS. Implicit learning and tacit knowledge. Canadian Journal of Experimental Psychology 1989; Volume 118: pp.219-235. 20McDowall J, Lustig A, Parkin G. Indirect learning of event sequences: the effects of divided attention and stimulus continuity. Canadian Journal of Experimental Psychology 1995; Volume 49: pp.415-436. 21Alex BF, Jaeger TF. Evidence for ımplicit learning in syntactic comprehension. Cognıtıve Science 2013; Volume 37: pp.578-591.22Steve Sheng , Mandy Holbrook , Ponnurangam Kumaraguru , Lorrie Faith Cranor , Julie Downs, Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 10-15, 2010, Atlanta, Georgia, USA [doi>10.1145/1753326.1753383]


Atıf Yapanlar

Gözat Sayfasına Dön

 

Sosyal Medya ve Araçlar

İstatistikler

  • Kayıt
    • Bu ay: 5
    • Toplam: 2326
  • Online
    • Ziyaretçi: 20
    • Üye: 0
    • Toplam: 20

Detaylı İstatistikler