This week’s articles are both case studies on users to see how easily they click on malware warnings. Article one: Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness by Devdatta Akhawe and Article two: Your Attention Please by Cristian Bravo-Lillo, el al. Article one focused on the percentage of “click throughs”Continue reading “Week 9 Reflection”
Author Archives: kmhouser2
Week 8 Reflection
This week’s two readings revolve around search engine use and the way users and others interact with them. Article one is Data Voids: Where Missing data can easily be exploited by Michael Golebiewski and Article two is Data Craft: The Manipulation of Social Media Metadata by Amelia Acker. This week is about manipulation and howContinue reading “Week 8 Reflection”
Week 7 Reflection
This week’s readings, Sorting Things Out: Classification and Its Consequences [1]by Geoffrey C Bowker and Susan Leigh Star; Experimentation in humanitarian locations: UNHCR and biometric registration of Afghan refugees [2] by Katja Lindskov Jacobsen; and Body, biometrics and identity [3] by Emilio Mordini and Sonia Massari; all revolve around the use of technology to keepContinue reading “Week 7 Reflection”
Week 5 Reflection
This week’s readings were about trust and the Internet, which is hilarious because I am pouring out my inner thoughts about what the authors said about the topic on the “Internet trust.” Article 1 is Surveillance & Society: Debate | Networked Privacy by Danah Boyd; Article 2 is Collective Information Practice: Exploring Privacy and SecurityContinue reading “Week 5 Reflection”
Reflection Week 4
This week made us think about the Internet in how open it is for the users. The articles were Degrees of Freedom, Dimensions of Power, by Yochai Benkler, (1); The Contingent Internet, by David D Clark, (2); and Internet Tussles – A Framework fro Analyzing Heterogeneous Networks, by Dustin O’Hara, (3). In article 1, YochaiContinue reading “Reflection Week 4”
Week 3 Reflections
This week’s theme revolved around ethnography and how it relates to the computer science world. Each article takes a different approach to ethnography, and while reading the pieces, I noticed ethnography has a loose definition and can be twisted and molded to fit the topic one is talking about. The articles this week are –Continue reading “Week 3 Reflections”
Week Two Reflections
This week’s readings focused on the introduction to usable security through the design of it, both big picture and specific examples, such as password protection. Each of the three articles – (1) On actor-network theory. A few clarifications plus more than a few complications, (2) A Brief Introduction to Usable Security and, (3) DesignX: ComplexContinue reading “Week Two Reflections”