Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ingolf Becker is active.

Publication


Featured researches published by Ingolf Becker.


Proceedings 2018 Workshop on Usable Security | 2018

Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption

Albese Demjaha; Jonathan Spring; Ingolf Becker; Simon Parkin; Angela Sasse

Background: Research has shown that users do not use encryption and fail to understand the security properties which encryption provides. We hypothesise that one contributing factor to failed user understanding is poor explanations of security properties, as the technical descriptions used to explain encryption focus on structural mental models. Purpose: We methodically generate metaphors for end-to-end (E2E) encryption that cue functional models and develop and test the metaphors’ effect on users’ understanding of E2E-encryption. Data: Transcripts of 98 interviews with users of various E2Eencrypted messaging apps and 211 survey responses. Method: First, we code the user interviews and extract promising explanations. These user-provided explanations inform the creation of metaphors using a framework for generating metaphors adapted from literature. The generated metaphors and existing industry descriptions of E2E-encryption are analytically evaluated. Finally, we design and conduct a survey to test whether exposing users to these descriptions improves their understanding of the functionality provided by E2E-encrypted messaging apps. Results: While the analytical evaluation showed promising results, none of the descriptions tested in the survey improve understanding; descriptions frequently cue users in a way that undoes their previously correct understanding. Metaphors developed from user language are better than existing industry descriptions, in that ours cause less harm. Conclusion: Creating explanatory metaphors for encryption technologies is hard. Short statements that attempt to cue mental models do not improve participants’ understanding. Better solutions should build on our methodology to test a variety of potential metaphors, to understand both the improvement and harm that metaphors may elicit.


Journal of Cybersecurity | 2017

International comparison of bank fraud reimbursement: customer perceptions and contractual terms

Ingolf Becker; Alice Hutchings; Ruba Abu-Salma; Ross J. Anderson; N Bohm; Steven J. Murdoch; M. Angela Sasse; Gianluca Stringhini

We set out to investigate how customers comprehend bank terms and conditions (TC in some cases they differ by product type, and advice can even be contradictory. While many banks allow customers to write PINs down as long as they are disguised and not kept with the card, 20% of banks do not allow PINs to be written down at all, and a handful do not allow PINs to be shared between accounts. We test our findings on 151 participants in Germany, the US and UK. They mostly agree: only 35% fully understand the T&Cs, and 28% find that sections are unclear. There are strong regional variations: Germans find their T&Cs particularly hard to understand, but Americans assume harsher T&Cs than they actually are, and tend to be reassured when they actually read them.


International Conference on Human Aspects of Information Security, Privacy, and Trust | 2017

No Good Reason to Remove Features

Steve Dodier-Lazaro; Ingolf Becker; Jens Krinke; M. Angela Sasse

Application sandboxes are an essential security mechanism to contain malware. Yet, they are seldom used on Desktops. We hypothesise this is because sandboxes are incompatible with plugins, and with APIs used to implement a wide variety of Desktop features. To verify this, we interviewed 13 expert users about their app appropriation decisions, and illustrate how they recruit values like usefulness, productivity or reliability in their decisions. We found that (a) security is an unimportant factor for appropriation; (b) plugins considerably support productivity needs and (c) users may abandon apps that remove a feature, especially for feature removals justified by security. Productivity-oriented expert Desktop users place more value in a stable user experience and in having flexible apps than in security benefits. Sandboxing thus conflicts with their values. We conclude that for sandboxed apps to be systematically adoptable by expert users, sandboxes must no longer require the sacrifice of plugins and features found in Desktop apps.


financial cryptography | 2016

Are Payment Card Contracts Unfair? (Short Paper)

Steven J. Murdoch; Ingolf Becker; Ruba Abu-Salma; Ross J. Anderson; N Bohm; Alice Hutchings; M. Angela Sasse; Gianluca Stringhini

Fraud victims are often refused a refund by their bank on the grounds that they failed to comply with their bank’s terms and conditions about PIN safety. We, therefore, conducted a survey of how many PINs people have, and how they manage them. We found that while only a third of PINs are ever changed, almost half of bank customers write at least one PIN down. We also found bank conditions that are too vague to test, or even contradictory on whether PINs could be shared across cards. Yet, some hazardous practices are not forbidden by many banks: of the 22.9% who re-use PINs across devices, half also use their bank PINs on their mobile phones. We conclude that many bank contracts fail a simple test of reasonableness, and ‘strong authentication’, as required by the Payment Services Directive II, should include usability testing.


symposium on usable privacy and security | 2016

Productive Security: A scalable methodology for analysing employee security behaviours

Adam Beautement; Ingolf Becker; Simon Parkin; Kat Krol; M. Angela Sasse


symposium on usable privacy and security | 2016

Applying Cognitive Control Modes to Identify Security Fatigue Hotspots

Simon Parkin; Kat Krol; Ingolf Becker; M. Angela Sasse


In: Proceedings of the 4th Learning from Authoritative Security Experiment Results (LASER) Workshop. (pp. pp. 43-53). IEEE: San Jose, CA, USA. (2016) | 2016

Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations

Ingolf Becker; Simon Parkin; Martina Angela Sasse


In: Position Papers. Values In Computing. (2017) | 2017

From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design

Steve Dodier-Lazaro; Ruba Abu-Salma; Ingolf Becker; Martina Angela Sasse


European Workshop on Usable Security | 2017

Finding Security Champions in Blends of Organisational Culture

Ingolf Becker; Simon Parkin; M. Angela Sasse


workshop on the economics of information security | 2016

International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms

Ingolf Becker; Alice Hutchings; Ruba Abu-Salma; Ross J. Anderson; N Bohm; Steven J. Murdoch; Martina Angela Sasse; Gianluca Stringhini

Collaboration


Dive into the Ingolf Becker's collaboration.

Top Co-Authors

Avatar

M. Angela Sasse

University College London

View shared research outputs
Top Co-Authors

Avatar

Simon Parkin

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ruba Abu-Salma

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jens Krinke

University College London

View shared research outputs
Researchain Logo
Decentralizing Knowledge