Bu kaydın yasal hükümlere uygun olmadığını düşünüyorsanız lütfen sayfa sonundaki Hata Bildir bağlantısını takip ederek bildirimde bulununuz. Kayıtlar ilgili üniversite yöneticileri tarafından eklenmektedir. Nadiren de olsa kayıtlarla ilgili hatalar oluşabilmektedir. MİTOS internet üzerindeki herhangi bir ödev sitesi değildir!

Implicit learning with certificate warning messages on SSL web pages: what are they teaching?

BROWSE_DETAIL_CREATION_DATE:

BROWSE_DETAIL_IDENTIFIER_SECTION

BROWSE_DETAIL_TYPE: Article

BROWSE_DETAIL_PUBLISH_STATE: Published

BROWSE_DETAIL_FORMAT: No File

BROWSE_DETAIL_LANG: English

BROWSE_DETAIL_SUBJECTS: TECHNOLOGY,

BROWSE_DETAIL_CREATORS: Bostan, Atila (Author),

BROWSE_DETAIL_CONTRIBUTERS:


BROWSE_DETAIL_PUBLICATION_NAME: Security and Communication Networks BROWSE_DETAIL_PUBLICATION_LOCATION: Newyork BROWSE_DETAIL_PUBLICATION_NUMBER: 9 BROWSE_DETAIL_PUBLICATION_VOLUME: 17 BROWSE_DETAIL_PUBLICATION_PAGE: 4295-4300


BROWSE_DETAIL_TAB_FILE:
BROWSE_DETAIL_NO_FILE

BROWSE_DETAIL_TAB_KEYWORDS




BROWSE_DETAIL_TAB_ABSTRACT

SSL-based web services are the most common technology in secure transactions on the Internet today. The security level of these services is inevitably related with that of digital certificates and user awareness. With the high number of nonconforming digital certificate usage, which eventually invokes warning messages on the Internet, users are implicitly forced to develop unsecure usage habits. In this study, we have studied the implicit learning effect of certificate warning messages on the SSL web pages. We have conducted two different experimental studies on university students and on instructors in IT departments. The results point to acquired indifference towards these warnings in users.


BROWSE_DETAIL_TAB_TOC

SSL, messages, security level, 


BROWSE_DETAIL_TAB_DESCRIPTION



BROWSE_DETAIL_TAB_RIGHTS



BROWSE_DETAIL_TAB_NOTES



BROWSE_DETAIL_TAB_REFERENCESSeger CA. Implicit learning. Psychological Bulletin 1994; Volume 115: pp.163-196. 1918 17Nightingale J. SSL information wants to be free. "http://blog.johnath.com/2009/01/" 21/ssl-information-wants-to-be-free, Latest Access Time for the website is May 17, 2016. 16Survey of the SSL Implementation of the Most Popular Web Sites, Trustworthy Internet Movement TIM, "https://www.trustworthyinternet.org/ssl-pulse", Latest Access Time for the website is 17 May 2016.Cormac Herley, So long, and no thanks for the externalities: the rational rejection of security advice by users, Proceedings of the 2009 workshop on New security paradigms workshop, September 08-11, 2009, Oxford, United Kingdom [doi>10.1145/1719030.1719050]15Rachna Dhamija , J. D. Tygar , Marti Hearst, Why phishing works, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 22-27, 2006, Montréal, Québec, Canada [doi>10.1145/1124772.1124861]1413Min Wu , Robert C. Miller , Simson L. Garfinkel, Do security toolbars actually prevent phishing attacks?, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 22-27, 2006, Montréal, Québec, Canada [doi>10.1145/1124772.1124863] 12Stuart E. Schechter , Rachna Dhamija , Andy Ozment , Ian Fischer, The Emperor's New Security Indicators, Proceedings of the 2007 IEEE Symposium on Security and Privacy, p.51-65, May 20-23, 2007 [doi>10.1109/SP.2007.35] 11Joshua Sunshine , Serge Egelman , Hazim Almuhimedi , Neha Atri , Lorrie Faith Cranor, Crying wolf: an empirical study of SSL warning effectiveness, Proceedings of the 18th conference on USENIX security symposium, p.399-416, August 10-14, 2009, Montreal, CanadaRyan West, The psychology of security, Communications of the ACM, v.51 n.4, p.34-40, April 2008 [doi>10.1145/1330311.1330320]10Amir Herzberg , Ahmad Jbara, Security and identification indicators for browsers against spoofing and phishing attacks, ACM Transactions on Internet Technology (TOIT), v.8 n.4, p.1-36, September 2008 [doi>10.1145/1391949.1391950]Jeffrey M. Stanton , Kathryn R. Stam , Paul Mastrangelo , Jeffrey Jolton, Analysis of end user security behaviors, Computers and Security, v.24 n.2, p.124-133, March, 2005 [doi>10.1016/j.cose.2004.07.001]98 7Joshua B. Gross , Mary Beth Rosson, Looking for trouble: understanding end-user security management, Proceedings of the 2007 symposium on Computer human interaction for the management of information technology, March 30-31, 2007, Cambridge, Massachusetts [doi>10.1145/1234772.1234786]6Kevin Palfreyman , Tom Rodden, A protocol for user awareness on the World Wide Web, Proceedings of the 1996 ACM conference on Computer supported cooperative work, p.130-139, November 16-20, 1996, Boston, Massachusetts, USA [doi>10.1145/240080.240236]CSI 2010-2011, 15th Annual CSI Computer Crime & Security Survey, Computer Security Institute, 2011, "http://reports.informationweek.com/cart/index/" downloadlink/id/7377, Latest Access Time for the website is 12 December 2013.5 14th Annual CSI Computer Crime & Security Survey, Comprehensive Addition, Computer Security Institute, 2009, "http://gocsi.com/purchase_survey" Latest Access Time for the website is 11 June 2011.4 3CSI Computer Crime & Security Survey2008, Computer Security Institute, "http://gocsi.com/sites/default/files/uploads/CSIsurvey2008.pdf", Latest Access Time for the website is 12 December 2013.John D'Arcy , Anat Hovav, Deterring internal information systems misuse, Communications of the ACM, v.50 n.10, p.113-117, October 2007 [doi>10.1145/1290958.1290971]2Anne Adams , Martina Angela Sasse, Users are not the enemy, Communications of the ACM, v.42 n.12, p.40-46, Dec. 1999 [doi>10.1145/322796.322806]Reber AS. Implicit learning and tacit knowledge. Canadian Journal of Experimental Psychology 1989; Volume 118: pp.219-235. 20McDowall J, Lustig A, Parkin G. Indirect learning of event sequences: the effects of divided attention and stimulus continuity. Canadian Journal of Experimental Psychology 1995; Volume 49: pp.415-436. 21Alex BF, Jaeger TF. Evidence for ımplicit learning in syntactic comprehension. Cognıtıve Science 2013; Volume 37: pp.578-591.22Steve Sheng , Mandy Holbrook , Ponnurangam Kumaraguru , Lorrie Faith Cranor , Julie Downs, Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 10-15, 2010, Atlanta, Georgia, USA [doi>10.1145/1753326.1753383]


BROWSE_DETAIL_TAB_REFERENCED_BYS

BROWSE_DETAIL_GOTO_LIST

 

TEXT_STATS

  • TEXT_RECORD_STATS
    • TEXT_STATS_THIS_MONTH: 3
    • TEXT_STATS_TOTAL: 2417
  • TEXT_ONLINE_STATS
    • TEXT_ONLINE_STATS_TOTALONLINEVISITOR: 14
    • TEXT_ONLINE_STATS_TOTALONLINEUSER: 0
    • TEXT_STATS_TOTAL: 14

LINK_STATS