WEBSITES AND EMAIL ADDRESS RELATIONSHIP By: Nahed Alnahash Dr. Wenjin Zhou.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Member Access Registration & Login. 2 Registration Next, click on the Register Now button. To register for Member Access users should navigate to
A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science.
Towards a Semantic Modeling of Learners for Social Networks Asma Ounnas, ILaria Liccardi, Hugh Davis, David Millard, and Su White Learning Technology Group.
Making friends on Facebook Isaac, Rahul, Alex and Kai.
Using Skype for Building Effective Group Collaboration MODULE I.
Setting up in Outlook Express. Select “Tools” from the toolbar menu.
PowerBase Webinar: Using Campaigns & Surveys Alice Aguilar Program Director For Audio call: ; access code #
How to Organize Your Thesis
Sara Xiong & Rebecca Radle, Advisor: Dr. Susan Wolfgram, University of Wisconsin-Stout Research Question & Hypothesis What resources do young single parents.
Confidential - © 2012 StreamWIDE © StreamWIDE
Click here to begin HOW TO CREATE REFWORKS ACCOUNT.
PATHS ® PROMOTING ALTERNATIVE THINKING STRATEGIES Insert Agency Logo Here Saving $$ for Our Community: Helping Children & Schools.
Thesis Report Chapter 1 (Introduction)
EMPRICAL RESEARCH REPORTS
WMMR Membership and Activity Reporting on the Web for Club Officers July 6, 2011 Joe Schrepfer Manager, Membership & Web Applications Lions Clubs International.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Market Research Lesson 6. Objectives Outline the five major steps in the market research process Describe how surveys can be used to learn about customer.
Sonia Kalwaney My Wiki site s.com.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
My Account With My Account you can change your password and unlock your account if you typed in a wrong password too many times. Go to
Qualtrics Data collection with Qualtrics Some Tips and Tricks Prof. Dr. Allard van Riel Marketing Department 3 March 2015.
The Online Activity Module User Account and Contact Us June 5, 2013.
How to Create a New Voicethread Account Leah Holck – Michigan State University Suzanne Bonn – Sugiyama Jogakuen University TESOL 2009.
A Step by Step Guide to Writing A Research Paper.
Using Skype for Building Effective Group Collaboration By JoAnn Fifield.
Global Teacher Blogs. Blogs – (Web log) a blog is a web site that is usually used as an individual journal and is publicly accessible. (
SharePoint Security Training Creating and Managing Users
April 8, 2008 Rusty Scott. Outline  Background & Motivation  A Student-Driven Initiative  Our Pilot Program  Going Forward.
Today we will… Outline how to plan an investigation Describe ways to collect information for my investigation.
Thesis  One sentence statement  Focus of your argument  Must connect the “what” to “why/how” Example: The ability to communicate online without face.
Privacy Considerations for Internet Protocols Alissa Cooper 1.
Electronic Surveys Inquiring With Authentic Language By: Hanan Al-Tamimy.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
Getting started with VendorVision Getting started with VendorVision Congratulations on using VendorVision! To get started, go to the VendorVision.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
QUESTRA HOLDINGS ACCOUNT REGISTRATION
Hotmail Tech Support phone number Ireland.
Columbus State University
Juno Password Reset Number
Juno Password Reset Number
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Optus Password Reset Number
WELCOME TO CHANGELLY CUSTOMER SUPPORT. Changelly is a cryptocurrency exchange service based in the Czech Republic. This is act as a link between trading.
Welcome MyCelium phone number MyCelium phone number.
HOTMAIL IS KNOWN FOR ITS BACK TO BACK AND INSTANT SERVICES. OUR TEAM MAKES SURE NO ISSUE GOES UN-ANSWERED OR NO SOLUTION TO AN ISSUE GOES WRONG. MANY.
WELCOME TO KUCOIN CUSTOMER SUPPORT NUMBER +1-(855) RELATED LINK-
Hotmail Password Recovery Number
Bigpond Contact Number  Support to update account features  Receive error messages during.
Solutions of Hotmail Problems Source Hotmail Issue.
IT Security awareness Training.
WORD PRESS How to create website using WordPress
Brief History of Cognitive Psychology
Student Experience It’s your education.
Created 2014 by Jolene Nottle for Unit EDN 113
Create a Parent Portal Account
FTM Frame Exchange Authentication
Hotmail Customer Support Helpline Number
Fix Hotmail Account Hacked Problems with Hotmail Support Phone Number
How to Reset a Forgotten Windows Live Hotmail Password? | Call
This presentation uses a free template provided by FPPT.com Hotmail Help Contact Number USA
This presentation uses a free template provided by FPPT.com Hotmail Help Contact Number USA
This presentation uses a free template provided by FPPT.com Microsoft Outlook Tech Support Number
How to Open Hotmail? | Hotmail Support Phone Number
How To Recover Outlook Password? | OUTLOOK CUSTOMER CARE NUMBER
Contact Details Brand Name : How to Recover Gmail Password Location : California Pin code : Website :
Presentation transcript:

WEBSITES AND ADDRESS RELATIONSHIP By: Nahed Alnahash Dr. Wenjin Zhou

Outline  Motivation  Thesis Statement  Contributions of the Thesis  Related Work  Methods  Result  Contribution  Conclusion 2

websites Dangers Motivation 3

Outline  Motivation  Thesis Statement  Contributions of the Thesis  Related Work  Methods  Result  Contribution  Conclusion 4

Thesis Statement  We may all be faced with dangers from using an address as an identity of most of websites.  These dangers can be solved by changing textual password to picture password and using authentication code as a last step to access websites. 5

Outline  Motivation  Thesis Statement  Contributions of the Thesis  Related Work  Methods  Result  Contribution  Conclusion 6

Contributions of the Thesis 1.Writing survey that focuses on users’ behaviors related to the use of their address. 2. Explain and analyze the result of my survey and discuss security and privacy problems related to that. 7

Outline  Motivation  Thesis Statement  Contributions of the Thesis  Related Work  Methods  Result  Contribution  Conclusion 8

Related Work  There has been some related work on risks of using address as an identity. [Lei et al.,2010] wrote a survey focus on users behaviors related to the use of their address that include 74 participants.[1]  [Lei et al.,2010] they shown that the 67.7% of the participants using their primary address during registration.[1]  [Florencio et al., 2007] have shown that participants use the same passwords on average in 3 different websites.[2] [1] [2] 9

Outline  Motivation  Thesis Statement  Contributions of the Thesis  Related Work  Methods  Result  Contribution  Conclusion 10

Methods  My survey is focused on users’ behaviors related to the use of their address.  Include 116 participants who responded to the survey.  It is include 21 questions.  Collected data and used it to analyze the relationship between users’ behaviors and security and privacy problems. 11

Methods Cont….  Analyze the result based on the related to the use of primary address.  63% * 49% = 30.9% 12 Using Primary and Same Password

Methods Cont…  Using primary address as an identity on the social websites  55% * 77% = 42.4% 13

Methods Cont… 14  Assuming that 25% of the participants using their Hotmail accounts in (e.g. FaceBook)  30.9% * 42.4% * 25% = 3.3%

Outline  Motivation  Thesis Statement  Contributions of the Thesis  Related Work  Methods  Result  Contribution  Conclusion 15

Result  From the result that what I got :  30.9% (using address with same password)  42.4% (using primary address as identity on the social websites)  3.3% (when assuming that 25% of the participants using primary in FaceBook) 16

Result Cont…  From the survey I found that the 81% from the participants have 1-3  41% they are remembering 3 passwords.  I recommend to change textual password to picture password 17

Result Cont…  Add second step to authorize the users by sending an verification code. 18

Contributions 1.Writing survey that focuses on users’ behaviors related to the use of their address. 2. Explain and analyze the result of my survey and discuss security and privacy problems related to that. 19

Outline  Motivation  Thesis Statement  Contributions of the Thesis  Related Work  Methods  Result  Contribution  Conclusion 20

Conclusion  I wrote a survey that focuses on users’ behaviors related to using address as identity in websites.  Analyze the result.  Recommend some ideas that will contribute to avoid hacker. 21

Questions?? 22

Acknowledgements  Special thanks and appreciate for you, Dr. Wenjin Zhou.  My husband.  Susan Sabra.  All my classmate. 23

Thank you! 24