Internet Users' Security and Privacy While They Interact with Amazon. / Bella, Giampaolo; Coles-Kemp, Lizzie.

Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, 2011. p. 878-883.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Internet Users' Security and Privacy While They Interact with Amazon. / Bella, Giampaolo; Coles-Kemp, Lizzie.

Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, 2011. p. 878-883.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Bella, G & Coles-Kemp, L 2011, Internet Users' Security and Privacy While They Interact with Amazon. in Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, pp. 878-883. https://doi.org/10.1109/TrustCom.2011.118

APA

Bella, G., & Coles-Kemp, L. (2011). Internet Users' Security and Privacy While They Interact with Amazon. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on (pp. 878-883). IEEE. https://doi.org/10.1109/TrustCom.2011.118

Vancouver

Bella G, Coles-Kemp L. Internet Users' Security and Privacy While They Interact with Amazon. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE. 2011. p. 878-883 https://doi.org/10.1109/TrustCom.2011.118

Author

Bella, Giampaolo ; Coles-Kemp, Lizzie. / Internet Users' Security and Privacy While They Interact with Amazon. Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, 2011. pp. 878-883

BibTeX

@inproceedings{8f181e227ad747e793d019e2f2a2c079,
title = "Internet Users' Security and Privacy While They Interact with Amazon",
abstract = "Amazon is the world's largest e-shopping site, with its market capitalization having just passed $100 billion [1]. Internet users interaction with its web site is an example of a widespread security ceremony - a ceremony focuses on security- related human interaction with technology, including security protocols and on-line service consumption [2]. This paper focuses on how Amazon's ceremony manages the users' security and privacy through the digital identities they may create with the popular web site. It leverages on the cognitive walkthrough method [3] to distill tasks, steps and walkthroughs of the ceremony, and then to pinpoint four risks affecting the users' security and privacy. It formulates four corresponding recommendations for technical web site updates that would resolve the noted risks. In particular, the recommendations address common contexts such as users accessing Amazon from their smartphones. A possible explanation of the coexistence of such risks with the late capitalization achievements is that users are more driven by familiarity and confidence than by trust. These findings are meant to be complemented with a homologous assessment from Amazon's standpoint.",
author = "Giampaolo Bella and Lizzie Coles-Kemp",
year = "2011",
doi = "10.1109/TrustCom.2011.118",
language = "English",
isbn = "978-1-4577-2135-9",
pages = "878--883",
booktitle = "Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Internet Users' Security and Privacy While They Interact with Amazon

AU - Bella, Giampaolo

AU - Coles-Kemp, Lizzie

PY - 2011

Y1 - 2011

N2 - Amazon is the world's largest e-shopping site, with its market capitalization having just passed $100 billion [1]. Internet users interaction with its web site is an example of a widespread security ceremony - a ceremony focuses on security- related human interaction with technology, including security protocols and on-line service consumption [2]. This paper focuses on how Amazon's ceremony manages the users' security and privacy through the digital identities they may create with the popular web site. It leverages on the cognitive walkthrough method [3] to distill tasks, steps and walkthroughs of the ceremony, and then to pinpoint four risks affecting the users' security and privacy. It formulates four corresponding recommendations for technical web site updates that would resolve the noted risks. In particular, the recommendations address common contexts such as users accessing Amazon from their smartphones. A possible explanation of the coexistence of such risks with the late capitalization achievements is that users are more driven by familiarity and confidence than by trust. These findings are meant to be complemented with a homologous assessment from Amazon's standpoint.

AB - Amazon is the world's largest e-shopping site, with its market capitalization having just passed $100 billion [1]. Internet users interaction with its web site is an example of a widespread security ceremony - a ceremony focuses on security- related human interaction with technology, including security protocols and on-line service consumption [2]. This paper focuses on how Amazon's ceremony manages the users' security and privacy through the digital identities they may create with the popular web site. It leverages on the cognitive walkthrough method [3] to distill tasks, steps and walkthroughs of the ceremony, and then to pinpoint four risks affecting the users' security and privacy. It formulates four corresponding recommendations for technical web site updates that would resolve the noted risks. In particular, the recommendations address common contexts such as users accessing Amazon from their smartphones. A possible explanation of the coexistence of such risks with the late capitalization achievements is that users are more driven by familiarity and confidence than by trust. These findings are meant to be complemented with a homologous assessment from Amazon's standpoint.

U2 - 10.1109/TrustCom.2011.118

DO - 10.1109/TrustCom.2011.118

M3 - Conference contribution

SN - 978-1-4577-2135-9

SP - 878

EP - 883

BT - Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on

PB - IEEE

ER -