-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi Bernard,
There are two areas where I'd love to see some research. The first is the effect of provenance on perceptions of security: when deciding how secure they believe a tool to be, how strongly are people influenced by their knowledge of who created the tool, versus their knowledge of how the tool works, or other factors? The second area is how people reason about security boundaries - or to put it another way, how people reason about the security properties of data as it moves between devices, between locations and between applications. For example, if someone believes that Skype is in some sense "more secure" than AIM, will that person treat files received over Skype differently from files received over AIM? What concepts will they refer to when explaining why they do or don't treat those files differently? Knowing more about how people reason about these issues would help developers to design tools that actually have the properties people think they have. Cheers, Michael On 22/09/12 16:06, Bernard Tyers - ei8fdb wrote: > Hi All, > > I am currently researching ideas for my masters in human computer > systems thesis. I am a mobile telecoms engineer by profession, but > am interested in HCI, tools that help maintain your security, > secure communications, and privacy concerns. > > There have been some interesting threads here that have brought up > some interesting questions for me: ∙ The thread discussing the > usability of tools, such as cryptocat. How it was (originally) easy > to use but may not have been as secure as possible. (NB: This is > not a jab/poke at anybodies work, or an excuse to bring up any of > the previous discussions about Cryptocat) ∙ The perception of tools > which are easy to use but may not be secure, eg. Viber, whereas > other tools are seen as secure, ∙ There are no shortcuts to being > secure. > > I am developing some ideas at the moment, which are mainly around > mobile, privacy, security, encryption tools, people's use of these > tools (and why some people don't use them), how to present > information such as possible interference with Internet users > traffic. > > I would be very interested to hear from anyone (on or off-list) who > has any suggestions, "I'd love to know XYZ" questions, or projects > that are currently on-going that may benefit from a MSc level > research project into the intersecting topics mentioned above. I am > open to discussing any ideas, so please let me know if you have an > idea. > > thanks in advance, Bernard > > -------------------------------------- Bernard / bluboxthief / > ei8fdb > > IO91XM / www.ei8fdb.org > > -- Unsubscribe, change to digest, or change password at: > https://mailman.stanford.edu/mailman/listinfo/liberationtech > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJQXdw2AAoJEBEET9GfxSfM6OYIALdFW4DhU70nWb0OrqxkvqKa WBbHtAFooKKYVwn1l7K72KyxHDvcq7bpvL8yZQuv3InF0fs0CDqf90op6eIpgFZp ViqsP4rtSDWjFdn+S2NZvscyPCs6uEU8et0kPo3Q4gYUBD8orbsa6M+6Plu+tso8 QPI16gm6e2AHeAzXvyUZGcpdDpgOgdBbWP6SJHk21Bv6/wsqilMIRh4WXEZeo/Oh e1Lx7SAOqqT3Dp4/V2Qwy1AntecDcKHFFUK87zNPnIvDZMQ7YNWUG0kaPSga3ux5 BVf6y4tlrweqvR7sGi9vi+tY0VNPYYEtqjRDnVNQrJ3FI6pcfm9goKPkcMBTGwU= =xh9r -----END PGP SIGNATURE----- -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech