Kristiina Karvonen

Learn More
In this paper we show how discussion about design quality or even usability is often discussion about aesthetics. First, we introduce some definitions of beauty in aesthetics. Then, we introduce how the beauty of the Web design affects the feeling of online trust, and bring forth observations about this design quality as an aesthetic notion. As a result, we(More)
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electronics with wireless communication abilities has made the problem more urgent than ever before. During the last few years, several solutions have appeared in the research literature.(More)
E-commerce has been slowed down due to the fact that consumers find Internet an untrustworthy environment, and are not willing to be guinea pigs of a new service and take unnecessary risks by giving their credit card number to an online service they cannot really trust. Yet, if e-commerce is to thrive, creating consumer trust is a necessity – or else there(More)
The application of computing to aesthetics, and the formation of art and design, has a long history, which resulted in the emergence of computer art as a new art form in the1960s, with the integration of hardware, software, and cybernetics. We propose to look at the complementary area of applying aesthetics to computing. Computing, and its mathematical(More)
The topic of computer and network security has gained an ever-increasing amount of interest in recent years. The pervasiveness of computers everywhere means that novel users, from novice to expert, need to be able to manage their own security in an understandable way, when giving information about themselves or making transactions online. In this paper, we(More)
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related question of the generic trust assumptions, which underlie the settings where the protocols are run, has received less attention. Furthermore , the notion of trust, as it is typically(More)
In this paper we present a cross-cultural comparison on users' perception on computer security issues, with a special emphasis on the notion of trust. The study was conducted by bringing together two previous approaches on trust: the user studies conducted previously in Finland were repeated in Sweden, with only slight alterations to account for national(More)
One of the main problems in the Internet architecture and the applications built on it is the lack of security. This affects the users' willingness to commit any transactions that require providing private information online. The goal of this user study was to find out and analyse the key factors behind users' comprehension of trustworthiness as regards the(More)
This paper presents a multicultural comparison on users' perception on computer security issues in Finland, Sweden, and Iceland. Special emphasis is given to the notion of trust: how trusting relations are formed both in an electronic environment, namely, the Internet, as well as outside it, in the real world. A set of user interviews, together with(More)
WLAN link layer security has been well studied but very little work exists in the area of intuitive access control inside home networks. In this paper we propose an approach that allows fine-grained access control without overburdening users with difficult questions or complicated configuration tasks. The proposed concept originated from a user needs study(More)