Usability and privacy: a study of Kazaa P2P file-sharing

@inproceedings{Good2003UsabilityAP,
  title={Usability and privacy: a study of Kazaa P2P file-sharing},
  author={Nathaniel Good and Aaron Krekelberg},
  booktitle={CHI '03},
  year={2003}
}
P2P file sharing systems such as Gnutella, Freenet, and KaZaA, while primarily intended for sharing multimedia files, frequently allow other types of information to be shared. This raises serious concerns about the extent to which users may unknowingly be sharing private or personal information.In this paper, we report on a cognitive walkthrough and a laboratory user study of the KaZaA file sharing user interface. The majority of the users in our study were unable to tell what files they were… 
Exposure of Sensitive Files in File Sharing Networks
TLDR
This work investigates the accessibility of a small number of common privacy-sensitive files on the EDonkey2000 and Kad file sharing networks and shows that with only a minimum of effort, it is possible to find files with highly sensitive personal information.
How many eyes are spying on your shared folders?
TLDR
Numen, a plug-in for eMule, is designed and implemented, which can effectively protect user private files from being shared without notice, which has become a serious threat for P2P users.
Data Privacy in P2P Systems
TLDR
A privacy model for P2P systems named PriMod which allows data owners to specify their privacy preferences in privacy policies and to associate them with their data is proposed and the development of PriServ, a privacy service located on top of DHT-based P1P systems which implements PriMod to prevent data privacy violations.
Privacy In Peer-to-Peer Networks
TLDR
The privacy aspect of today’s P2P networks and the information that can be collected from the users of P1P software are discussed and the importance of the collected information and possible ways to use it are discussed.
Usable and Secure P2P VoIP for Mobile Use
TLDR
The authors have developed a P2P VoIP system for mobile devices, which features techniques for improving the security and privacy of users in P1P networks and seeks to improve the usability of the emerging application by conducting iterative rounds of user interviews, questionnaires and usability testing with potential end users.
Information displays for managing shared files
TLDR
Using an awareness framework, this work identified the core information that users need to be aware of for file sharing situations, performed two studies to determine how to best represent those concepts as labels and icons, and developed a prototype for a file manager that reveals file sharing activity.
Holistic Privacy and Usability of a Cryptocurrency Wallet
TLDR
This study did a 60 person task-based evaluation of the usability of a ZCash cryptocurrency wallet by having users install and try to both send and receive anonymized ZCash transactions, as well as install a VPN and Tor.
LLSS: toward system support for plugging privacy leaks
TLDR
Imagine that two users, Alice and Bob, have a conversation about a sensitive subject over email, and someone on the peer-to-peer network peruses Bob's shared space, finds his email files, and reads their private conversation.
Why file sharing networks are dangerous?
TLDR
This analysis and experimental results clearly show the security risk of P2P file sharing networks and present experimental evidence of the risk through honey-pot experiments that expose both business and personal financial information and the resulting consequences.
Understanding Pollution Dynamics in P2P File Sharing
TLDR
From the analysis, it is found that user “awareness” of pollution is a key factor in pollution dynamics and a mathematical model is proposed to assess the impact of pollution on file popularity evolution.
...
...

References

SHOWING 1-10 OF 16 REFERENCES
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
TLDR
It is concluded that PGP 5.0 is not usable enough to provide effective security for most computer users, despite its attractive graphical user interface, supporting the hypothesis that user interface design for effective security remains an open problem.
User Interaction Design for Secure Systems
  • K. Yee
  • Computer Science
    ICICS
  • 2002
TLDR
Ten principles for secure interaction design are identified and the concept of the subjective actor-ability state is introduced, to model systems in terms of actors and actions.
The protection of information in computer systems
TLDR
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification by examining in depth the principles of modern protection architectures and the relation between capability systems and access control list systems.
Presto: an experimental architecture for fluid interactive document spaces
TLDR
Presto is a prototype document management system providing rich interaction with documents through meaningful, user-level document attributes, which provide a basis for novel document systems design and new approaches to document management and interaction.
Web page design: implications of memory, structure and scent for information retrieval
TLDR
An experiment to see if large breadth and decreased depth is preferable, both subjectively and via performance data, while attempting to design for optimal scent throughout different structures of a website showed that, while increased depth did harm search performance on the web, a medium condition of depth and breadth outperformed the broadesf shallow web structure overall.
The magical number seven plus or minus two: some limits on our capacity for processing information.
TLDR
The theory provides us with a yardstick for calibrating the authors' stimulus materials and for measuring the performance of their subjects, and the concepts and measures provided by the theory provide a quantitative way of getting at some of these questions.
The Depth/Breadth Tradeoff in Hierarchical Computer Menus
TLDR
Goal acquisition speed and accuracy were compared for subjects using four different menu configurations of a semantic hierarchy on an interactive computer terminal demonstrating that the fastest conditions also produced the least errors.
Hierarchical Menu Design: Breadth, Depth, and Task Complexity
TLDR
It is suggested that the cognitive component influencing users' perceptions of the complexity of the different menu structures was short-term memory load, which is linked to an existing theory of task complexity.
...
...