63 research outputs found

    "Sign in with ... Privacy'': Timely Disclosure of Privacy Differences among Web SSO Login Options

    Full text link
    The number of login options on web sites has increased since the introduction of web single sign-on (SSO) protocols. Web SSO services allow users to grant web sites or relying parties (RPs) access to their personal profile information from identity provider (IdP) accounts. Many RP sites do not provide sufficient privacy information that could help users make informed login decisions. Moreover, privacy differences in permission requests across login options are largely hidden from users and are time-consuming to manually extract and compare. In this paper, we present an empirical analysis of popular RP implementations supporting three major IdP login options (Facebook, Google, and Apple) and categorize RPs in the top 500 sites into four client-side code patterns. Informed by these RP patterns, we design and implement SSOPrivateEye (SPEye), a browser extension prototype that extracts and displays to users permission request information from SSO login options in RPs covering the three IdPs

    Influences of Displaying Permission-related Information on Web Single Sign-On Login Decisions

    Full text link
    Web users are increasingly presented with multiple login options, including password-based login and common web single sign-on (SSO) login options such as "Login with Google" and "Login with Facebook". There has been little focus in previous studies on how users choose from a list of login options and how to better inform users about privacy issues in web SSO systems. In this paper, we conducted a 200-participant study to understand factors that influence participants' login decisions, and how they are affected by displaying permission differences across login options; permissions in SSO result in release of user personal information to third-party web sites through SSO identity providers. We compare and report on login decisions made by participants before and after viewing permission-related information, examine self-reported responses for reasons related to their login decisions, and report on the factors that motivated their choices. We find that usability preferences and inertia causes (habituation) were among the dominant factors influencing login decisions. After participants viewed permission-related information, many prioritised privacy over other factors, changing their login decisions to more privacy-friendly alternatives. Displaying permission-related information also influenced some participants to make tradeoffs between privacy and usability preferences

    Football history: a German perspective on current research fields

    Get PDF
    In the last 25 years, German football has experienced several turning points. First, the collapse of communism in 1989 rendered necessary a complete reorganisation of the sport and football landscape in eastern Germany. Second, in parallel with the award in the year 2000 of the right to host the 2006 FIFA World Cup in the Federal Republic of Germany, a significant upturn took place in academic research on football. The reappraisal of the National Socialist era, in particular, has experienced a noticeable upswing since the year 2000. The present article focuses on several key thematic areas that shape current research and will shape research in the future. They include, first, the question of the character of the Vereine (here: football clubs) under the conditions of a communist dictatorship, and second, an increased interest in the biographical component of the history of the development of football. At the same time, it is clear that by now the question of a memory culture in football is no longer limited to national perspectives such as the reappraisal of the "Miracle of Bern". Rather, the dynamic development of European football renders possible the emergence of European realms of shared memory. At the same time, a boom in public engagement with football history can be observed in Germany and elsewhere. This holds true for both the social commemoration of footballers who were victims of war and tyranny and for popular cultural publications. In recent years, therefore, there has not only been an increase in the “museumisation” but also in the media marketing of football history. Thus, football history itself has become a market that is served by various stakeholders, such as clubs, companies, and the media

    Efficient Emptiness Check for Timed B\"uchi Automata (Extended version)

    Full text link
    The B\"uchi non-emptiness problem for timed automata refers to deciding if a given automaton has an infinite non-Zeno run satisfying the B\"uchi accepting condition. The standard solution to this problem involves adding an auxiliary clock to take care of the non-Zenoness. In this paper, it is shown that this simple transformation may sometimes result in an exponential blowup. A construction avoiding this blowup is proposed. It is also shown that in many cases, non-Zenoness can be ascertained without extra construction. An on-the-fly algorithm for the non-emptiness problem, using non-Zenoness construction only when required, is proposed. Experiments carried out with a prototype implementation of the algorithm are reported.Comment: Published in the Special Issue on Computer Aided Verification - CAV 2010; Formal Methods in System Design, 201

    Uncovering trophic interactions in arthropod predators through DNA shotgun-sequencing of gut contents

    Get PDF
    Characterizing trophic networks is fundamental to many questions in ecology, but this typically requires painstaking efforts, especially to identify the diet of small generalist predators. Several attempts have been devoted to develop suitable molecular tools to determine predatory trophic interactions through gut content analysis, and the challenge has been to achieve simultaneously high taxonomic breadth and resolution. General and practical methods are still needed, preferably independent of PCR amplification of barcodes, to recover a broader range of interactions. Here we applied shotgun-sequencing of the DNA from arthropod predator gut contents, extracted from four common coccinellid and dermapteran predators co-occurring in an agroecosystem in Brazil. By matching unassembled reads against six DNA reference databases obtained from public databases and newly assembled mitogenomes, and filtering for high overlap length and identity, we identified prey and other foreign DNA in the predator guts. Good taxonomic breadth and resolution was achieved (93% of prey identified to species or genus), but with low recovery of matching reads. Two to nine trophic interactions were found for these predators, some of which were only inferred by the presence of parasitoids and components of the microbiome known to be associated with aphid prey. Intraguild predation was also found, including among closely related ladybird species. Uncertainty arises from the lack of comprehensive reference databases and reliance on low numbers of matching reads accentuating the risk of false positives. We discuss caveats and some future prospects that could improve the use of direct DNA shotgun-sequencing to characterize arthropod trophic networks
    corecore