Kristiina Karvonen

Learn More
In this paper we show how discussion about design quality or even usability is often discussion about aesthetics. First, we introduce some definitions of beauty in aesthetics. Then, we introduce how the beauty of the Web design affects the feeling of online trust, and bring forth observations about this design quality as an aesthetic notion. As a result, we(More)
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electronics with wireless communication abilities has made the problem more urgent than ever before. During the last few years, several solutions have appeared in the research literature.(More)
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related question of the generic trust assumptions, which underlie the settings where the protocols are run, has received less attention. Furthermore, the notion of trust, as it is typically(More)
Bluetooth-technology enables objects to communicate with each other, humans to communicate with each other, and humans to communicate with objects. This paper discusses some possible ways to develop context awareness to enhance the Bluetooth-devices ability to "guess" the groups that Bluetooth (end) user is seeing and using at each moment.
In this paper we present a cross-cultural comparison on users’ perception on computer security issues, with a special emphasis on the notion of trust. The study was conducted by bringing together two previous approaches on trust: the user studies conducted previously in Finland were repeated in Sweden, with only slight alterations to account for national(More)
This paper presents a multicultural comparison on users' perception on computer security issues in Finland, Sweden, and Iceland. Special emphasis is given to the notion of trust: how trusting relations are formed both in an electronic environment, namely, the Internet, as well as outside it, in the real world. A set of user interviews, together with(More)
WLAN link layer security has been well studied but very little work exists in the area of intuitive access control inside home networks. In this paper we propose an approach that allows fine-grained access control without overburdening users with difficult questions or complicated configuration tasks. The proposed concept originated from a user needs study(More)
Computer security and doing business online are issues that everyone is very anxious about at the moment, but the main interest is making money not philosophy. At present, the untrustworthiness of the Web is one of the main obstacles for the developing of services there, as well as for their increased use. For example, the renowned usability expert Jacob(More)