36,779 research outputs found

    From usability to secure computing and back again

    Full text link
    Secure multi-party computation (MPC) allows multiple parties to jointly compute the output of a function while preserving the privacy of any individual party’s inputs to that function. As MPC protocols transition from research prototypes to realworld applications, the usability of MPC-enabled applications is increasingly critical to their successful deployment and widespread adoption. Our Web-MPC platform, designed with a focus on usability, has been deployed for privacy-preserving data aggregation initiatives with the City of Boston and the Greater Boston Chamber of Commerce. After building and deploying an initial version of the platform, we conducted a heuristic evaluation to identify usability improvements and implemented corresponding application enhancements. However, it is difficult to gauge the effectiveness of these changes within the context of real-world deployments using traditional web analytics tools without compromising the security guarantees of the platform. This work consists of two contributions that address this challenge: (1) the Web-MPC platform has been extended with the capability to collect web analytics using existing MPC protocols, and (2) as a test of this feature and a way to inform future work, this capability has been leveraged to conduct a usability study comparing the two versions ofWeb-MPC. While many efforts have focused on ways to enhance the usability of privacy-preserving technologies, this study serves as a model for using a privacy-preserving data-driven approach to evaluate and enhance the usability of privacy-preserving websites and applications deployed in realworld scenarios. Data collected in this study yields insights into the relationship between usability and security; these can help inform future implementations of MPC solutions.Published versio

    Secure multi-party computation for analytics deployed as a lightweight web application

    Full text link
    We describe the definition, design, implementation, and deployment of a secure multi-party computation protocol and web application. The protocol and application allow groups of cooperating parties with minimal expertise and no specialized resources to compute basic statistical analytics on their collective data sets without revealing the contributions of individual participants. The application was developed specifically to support a Boston Women’s Workforce Council (BWWC) study of wage disparities within employer organizations in the Greater Boston Area. The application has been deployed successfully to support two data collection sessions (in 2015 and in 2016) to obtain data pertaining to compensation levels across genders and demographics. Our experience provides insights into the particular security and usability requirements (and tradeoffs) a successful “MPC-as-a-service” platform design and implementation must negotiate.We would like to acknowledge all the members of the Boston Women’s Workforce Council, and to thank in particular MaryRose Mazzola, Christina M. Knowles, and Katie A. Johnston, who led the efforts to organize participants and deploy the protocol as part of the 100% Talent: The Boston Women’s Compact [31], [32] data collections. We also thank the Boston University Initiative on Cities (IOC), and in particular Executive Director Katherine Lusk, who brought this potential application of secure multi-party computation to our attention. The BWWC, the IOC, and several sponsors contributed funding to complete this work. Support was also provided in part by Smart-city Cloud-based Open Platform and Ecosystem (SCOPE), an NSF Division of Industrial Innovation and Partnerships PFI:BIC project under award #1430145, and by Modular Approach to Cloud Security (MACS), an NSF CISE CNS SaTC Frontier project under award #1414119

    Demarcating mobile phone interface design guidelines to expedite selection

    Get PDF
    Guidelines are recommended as a tool for informing user interface design. Despite a proliferation of guidelines in the research literature, there is little evidence of their use in industry, nor their influence in academic literature. In this paper, we explore the research literature related to mobile phone design guidelines to find out why this should be so. We commenced by carrying out a scoping literature review of the mobile phone design guideline literature to gain insight into the maturity of the field. The question we wanted to explore was: “Are researchers building on each others’ guidelines, or is the research field still in the foundational stage?” We discovered a poorly structured field, with many researchers proposing new guidelines, but little incremental refinement of extant guidelines. It also became clear that the current reporting of guidelines did not explicitly communicate their multi-dimensionality or deployment context. This leaves designers without a clear way of discriminating between guidelines, and could contribute to the lack of deployment we observed. We conducted a thematic analysis of papers identified by means of a systematic literature review to identify a set of dimensions of mobile phone interface design guidelines. The final dimensions provide a mechanism for differentiating guidelines and expediting choice

    Evaluating usability of cross-platform smartphone applications

    Get PDF
    The computing power of smartphones is increasing as time goes. However, the proliferation of multiple different types of operating platforms affected interoperable smartphone applications development. Thus, the cross-platform development tools are coined. Literature showed that smartphone applications developed with the native platforms have better user experience than the cross-platform counterparts. However, comparative evaluation of usability of cross-platform applications on the deployment platforms is not studied yet. In this work, we evaluated usability of a crossword puzzle developed with PhoneGap on Android, Windows Phone, and BlackBerry. The evaluation was conducted focusing on the developer's adaptation effort to native platforms and the end users. Thus, we observed that usability of the cross-platform crossword puzzle is unaffected on the respective native platforms and the SDKs require only minimal configuration effort. In addition, we observed the prospect of HTML5 and related web technologies as our future work towards evaluating and enhancing usability in composing REST-based services for smartphone applications

    Use of scenario evaluation in preparation for deployment of a collaborative system for knowledge transfer - the case of KiMERA

    Get PDF
    This paper presented an approach for the evaluation of a collaborative system, after the completion of system development and software testing but before its deployment. Scenario and collaborative episodes were designed and data collected from users role-playing. This was found to be a useful step in refining the user training, in setting the right level of user expectation when the system started to roll-out to real users and in providing feedback to the development team

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    Eras of electric vehicles: electric mobility on the Verge. Focus Attention Scale

    Get PDF
    Daily or casual passenger vehicles in cities have negative burden on our finite world. Transport sector has been one of the main contributors to air pollution and energy depletion. Providing alternative means of transport is a promising strategy perceived by motor manufacturers and researchers. The paper presents the battery electric vehicles-BEVs bibliography that starts with the early eras of invention up till 2015 outlook. It gives a broad overview of BEV market and its technology in a chronological classification while sheds light on the stakeholders’ focus attentions in each stage, the so called, Focus-Attention-Scale-FAS. The attention given in each era is projected and parsed in a scale graph, which varies between micro, meso, and macro-scale. BEV-system is on the verge of experiencing massive growth; however, the system entails a variety of substantial challenges. Observations show the main issues of BEVsystem that require more attention followed by the authors’ recommendations towards an emerging market
    • …
    corecore