ABSTRACT
Tools aimed at helping users safely navigate the web and safeguard themselves against potential online predators have become reasonably common. Currently there are two families of tools; heuristics analysis tools that test websites directly using automated scripts and programs, and community based tools where users rate websites and write reviews for the benefit of others. In this paper we examine the relative strengths and weaknesses of each technique, whether these techniques are compatible, and how community feedback can be combined with heuristic-based evaluations. In order to do this we conduct a large-scale comparison of the ratings of heuristic and community based tools, and explore novel methods for abstracting key information from user comments, which could be used to add context and nuance to heuristic based ratings. We find that heuristic and community based ratings are highly complementary, and can be combined to potentially guide users to make more informed decisions.
- Alexa., http://alexa.com.Google Scholar
- AlpineLinux., http://www.alpinelinux.org/wiki.Google Scholar
- Amatriain, X., Pujol, J. M., Tintarev, N., Rate it Again: Increasing Recommendation Accuracy by User re-Rating. RecSys'09, October 23--25, 2009, New York, USA. Google ScholarDigital Library
- AOL explorer., http://www.aol.com/.Google Scholar
- Artviper., http://www.artviper.net/texttagcloud/.Google Scholar
- Avira., http://www.avira.com/en/pages/index.php.Google Scholar
- Bilgic, M., and Mooney, R. J., Explaining recommendations: Satisfaction vs. promotion. In Proceedings of Beyond Personalization Workshop, IUI, 2005. San Diego, California, USA.Google Scholar
- Brightmail., http://www.symantec.com/business/products/family.jsp?familyid=brightmail.Google Scholar
- Chen, M., Singh, J. P., Computing and Using Reputations for Internet Ratings. EC'01, October 14-17, 2001, Tampa, Florida, USA. Google ScholarDigital Library
- Dellarocas, C., Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior. EC'00, October 17-20, 2000, Minneapolis, Minnesota. Google ScholarDigital Library
- Dourish, P., Grinter, R., Delgado de la Flor, J. and Joseph, M. Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitous Computing, 8 (6). 391--401. Google ScholarCross Ref
- Edwards, W. K., Poole, E. S. and Stoll, J., Security Automation Considered Harmful? In Proceedings of the IEEE New Security Paradigms Workshop 2007, (White Mountain, New Hampshire, 2007). Google ScholarDigital Library
- Goecks, J., Edwards, W. K., and Mynatt, E. D., Challenges in Supporting End-User Privacy and Security Management with Social Navigation. Symposium On Usable Privacy and Security (SOUPS) 2009, July 15-17 2009, Mountain View, CA, USA. Google ScholarDigital Library
- Gross, J. and Rosson, M. B., Looking for Trouble: Understanding End-User Security Management. in 2007 Computer Human Interaction for the Management of Information Technology, (2007), ACM Press, 10. Google ScholarDigital Library
- Herlocker, J., Konstan, J., and Riedl, J., Explaining collaborative filtering recommendations. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, 2000. CHI Letters 5(1). Google ScholarDigital Library
- Hu, N., Pavlou, P. A., Zhang, J., Can Online Reviews Reveal a Product's True Quality? Empirical Findings and Analytical Modeling of Online Word-of-Mouth Communication. EC'06, June 11-15, 2006, Ann Arbor, Michigan, USA. Google ScholarDigital Library
- Ipfire., http://www.ipfire.org/en/index.Google Scholar
- Jin, R., Si, L., A Study of Methods for Normalizing User Ratings in Collaborative Filtering. SIGIR'04, July 25-29, 2004, Sheffield, South Yorkshire, UK. Google ScholarDigital Library
- McAfee., http://www.mcafee.com/us/.Google Scholar
- McAfee SiteAdvisor., http://www.siteadvisor.com/.Google Scholar
- McAfee SpamKiller., http://us.mcafee.com/root/product.asp?productid=msk.Google Scholar
- McNee, S., Kapoor, N. and Konstan, J. A., Don't Look Stupid: Avoiding Pitfalls when Recommending Research Papers. In 2006 Conference on Computer-Support Cooperative Work (CSCW 2006), (2006), 171--180. Google ScholarDigital Library
- Mozilla Firefox anti-phishing., http://www.mozilla.com/en-US/firefox/phishing-protection/.Google Scholar
- Norton., http://us.norton.com/index.jsp.Google Scholar
- Norton SafeWeb., http://safeweb.norton.com/.Google Scholar
- Sen, S., Lam, S. K., Rashid, A. M., Cosley, D., Frankowski, D., Osterhouse, J., Harper, F. M., and Riedl, J., tagging, communities, vocabulary, evolution. In Proceedings of the ACM 2006 Conference on CSCW, Banff, Alberta, Canada, 2006. Google ScholarDigital Library
- Sinha, R., and Swearingen, K., The role of transparency in recommender systems. In CHI '02: CHI '02 extended abstracts on Human factors in computing systems, pages 830--831, New York, NY, USA, 2002. ACM. Google ScholarDigital Library
- Vig, J., Sen, S., Riedl, J., Tagsplanations: Explaining Recommendations Using Tags. IUI'09, February 8 - 11, 2009, Sanibel Island, Florida, USA. Google ScholarDigital Library
- Spamassassin., http://spamassassin.apache.org/.Google Scholar
- SpyBot., http://www.safer-networking.org/en/index.html.Google Scholar
- Svensson, M., Höök, K., Laaksolahti, J. and Waern, A., Social Navigation of Food Recipes. in 2001 Conference on Human Factors in Computing, (2001), 341--348. Google ScholarDigital Library
- Tagcrowd., http://tagcrowd.com.Google Scholar
- Untangle., http://www.untangle.com/.Google Scholar
- Web of Trust., http://www.mywot.com/.Google Scholar
- Webroot popup washer., http://www.webroot.com/En_US/consumer-products-spysweeper.html.Google Scholar
- Wordle., http://www.wordle.net/create.Google Scholar
- Zdziarski, J. A., Ending spam: Bayesian content filtering and the art of statistical language classification. Google ScholarDigital Library
Index Terms
- Integrating user feedback with heuristic security and privacy management systems
Recommendations
Does sentiment help requirement engineering: exploring sentiments in user comments to discover informative comments
AbstractUser comments are valuable resources for software improvement; however, owing to excessive volume, informative comments need to be selectively analyzed. We attempt to address this problem by sentiment analysis and expect sentiment can be a useful ...
Assessing the Impact of Affective Feedback on End-User Security Awareness
Human Aspects of Information Security, Privacy and TrustAbstractA lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise ...
Requirements knowledge acquisition from online user forums
Online discussion forums can be used for reflecting on the overall user experience of a system. If a user forum is well‐structured, it can be a valuable source of requirements‐related information, which can potentially be accommodated in the requirements ...
Comments