Naïve Security in a Wi-Fi World

Abstract : Despite nearly ubiquitous access to wireless networks, many users still engage in risky behaviors, make bad choices, or are seemingly indifferent to the concerns that security and privacy researchers work diligently to address. At present, research on user attitudes toward security and privacy on public Wi-Fi networks is rare. This paper explores Wi-Fi security and privacy by analyzing users' current actions and reluctance to change. Through interviews and concrete demonstrations of vulnerability, we show that users make security choices based on (often mistaken) analogy to the physical world. Moreover, despite increased awareness of vulnerability, users remain ingenuous, failing to develop a realistic view of risk. We argue that our data present a picture of users engaged in a form of naïve security. We believe our results will be beneficial to researchers in the area of security-tool design, in particular with respect to better informing user choices.
Type de document :
Communication dans un congrès
Masakatsu Nishigaki; Audun Jøsang; Yuko Murayama; Stephen Marsh. 4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. Springer, IFIP Advances in Information and Communication Technology, AICT-321, pp.32-47, 2010, Trust Management IV. 〈10.1007/978-3-642-13446-3_3〉
Liste complète des métadonnées

Littérature citée [20 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01061317
Contributeur : Hal Ifip <>
Soumis le : lundi 27 novembre 2017 - 15:29:02
Dernière modification le : mardi 28 novembre 2017 - 01:17:04

Fichier

SwansonUL10.pdf
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Colleen Swanson, Ruth Urner, Edward Lank. Naïve Security in a Wi-Fi World. Masakatsu Nishigaki; Audun Jøsang; Yuko Murayama; Stephen Marsh. 4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. Springer, IFIP Advances in Information and Communication Technology, AICT-321, pp.32-47, 2010, Trust Management IV. 〈10.1007/978-3-642-13446-3_3〉. 〈hal-01061317〉

Partager

Métriques

Consultations de la notice

301

Téléchargements de fichiers

6