Towards a Usable Framework for Modelling Security and Privacy ...

1 downloads 0 Views 204KB Size Report
Key words: Risk modelling; internet-of-things; smart homes; risk com- munication ... to the context of smart homes (i.e., homes with deployed IoT devices) for two.
3CJ5E8F 5 4F56@9 ,E5A9JCE? ;CE /C89@@>B< 297HE>GK 5B8 0E>I57K 1>F?F >B G=9 2A5EG -CA9 DVhdc K,=, HjghZ! * ;]bVY ;iVba^* VcY ;cYgZl GVgi^c 9T_Pac\T]c ^U 8^\_dcTa IRXT]RT& K]XeTabXch ^U EgU^aS& EgU^aS& KA ! &#+)(!(,*+%"$+!)-!#$!,' +/786.08! JWT ?]cTa]Tc'^U'JWX]Vb $?^J% dbWTab X] P ]Tf PVT fWTaT cWT ePaXTch P]S P\^d]c ^U R^]]TRcTS& b\Pac STeXRTb _aTbT]c X] cWT W^\T Xb bTc c^ X]RaTPbT bdQbcP]cXP[[h( MWX[T cWTbT QaX]V bTeTaP[ PSeP]cPVTb X] cTa\b ^U R^]eT]XT]RT P]S PbbXbcTS [XeX]V& bTRdaXch P]S _aXePRh aXbZb PaT P[b^ P R^]RTa]( ?] cWXb PacXR[T& fT R^]bXSTa cWXb aXbZ _a^Q[T\ Ua^\ cWT _Tab_TRcXeT ^U cTRW]^[^Vh $#!"# X] cWT b\Pac W^\T& P]S bTc ^dc c^ _a^eXST P dbPQ[T UaP\Tf^aZ U^a \^ST[[X]V bTRdaXch P]S _aXePRh aXbZb( JWT ]^eT[ch ^U cWXb f^aZ Xb X] Xcb T\_WPbXb ^] bd__[hX]V P bX\_[X"TS aXbZ PbbTbb\T]c P__a^PRW& R^\_[TcT fXcW ch_XRP[ b\Pac W^\T dbT RPbTb& W^\T STeXRTb& ?^J cWaTPc P]S PccPRZ \^ST[b& P]S _^cT]cXP[ bTRdaXch R^]ca^[b( JWT X]cT]cX^] Xb U^a cWXb UaP\Tf^aZ P]S cWT bd__^acX]V c^^[ X]cTaUPRT c^ QT dbTS Qh PRcdP[ W^\T dbTab X]cTaTbcTS X] d]STabcP]SX]V P]S \P]PVX]V cWT aXbZb X] cWTXa b\Pac W^\T T]eXa^]\T]cb( -2; 95617* HXbZ \^ST[[X]V5 X]cTa]Tc'^U'cWX]Vb5 b\Pac W^\Tb5 aXbZ R^\' \d]XRPcX^]5 dbPQ[T bTRdaXch5 b\Pac RXcXTb5 c^^[ bd__^ac

$ .BGEC8H7G>CB MZX]cdad\n ]Vh ]VY Vc Zcdgbdjh ^beVXi dc djg ldgaY idYVn, ;bdc\hi di]Zg i]^c\h* ^i ]Vh \gZVian VYkVcXZY XdbbZgXZ* ]ZVai]XVgZ* igVkZa* VcY d$XZ VcY ]dbZ a^[Z, M]Z CciZgcZi+d[+M]^c\h (CdM) ^h i]Z cZmi h^\c^"XVci eVgVY^\b hZi id egd\gZhh iZX]cdad\n ZkZc [jgi]Zg, Ci YZhXg^WZh V gZVa^in l]ZgZ ZkZgn YVn Ui]^c\h' VgZ Vaa XdccZXiZY* ldg`^c\ id\Zi]Zg idlVgYh hdbZ \gVcYZg ejgedhZ, ;h i]Z edej+ aVg^in d[ CdM ]Vh \gdlc* hd idd ]Vh i]Z [dXjh dc bV^ciV^c^c\ hZXjg^in VcY eg^kVXn, M]ZgZ ]VkZ WZZc kVg^djh Vgi^XaZh gZ#ZXi^c\ dc i]ZhZ egdeZgi^Zh VXgdhh hZkZgVa CdM XdciZmih* hdbZ Zbe]Vh^h^c\ i]Z^g cZZY (Z,\,* k^V hjhXZei^WaZ kjacZgVW^a^i^Zh VcY ViiVX`h) VcY deZc ^hhjZh* VcY di]Zgh egdedh^c\ ediZci^Va hdaji^dch [dg XjggZci VcY [jijgZ X]VaaZc\Zh R/T, P]^aZ i]ZhZ VgZ ZmXZaaZci ed^cih d[ gZ[ZgZcXZ* i]Z^g YZiV^a VcY eZgheZXi^kZ bV`Z i]Zb hdbZl]Vi Y^$Xjai id Veean VcY jhZ l]Zc Zc+ \V\^c\ ^c egVXi^XVa hZXjg^in iVh`h* hjX] Vh g^h` VcVanh^h, BZgZ* lZ gZ[Zg ZheZX^Vaan id XVhZh l]ZgZ dcZ l^h]Zh id jhZ hjX] ide^XVa gZ[ZgZcXZ ed^cih Vadc\ l^i] di]Zg ^c[dgbVi^dc (Z,\,* cZildg` hZijeh) id bdYZa i]Z g^h` ^c V eVgi^XjaVg CdM YZeadn+ bZci, GdgZdkZg* id Zc\V\Z l^i]* VcY Xdbbjc^XViZ i]Vi hZXjg^in dg eg^kVXn g^h` id di]Zgh* [dg ^chiVcXZ* ine^XVa jhZgh ^c i]Vi Zck^gdcbZci,

To be published at the 4th International Conference on Human Aspects of Information Security, Privacy and Trust in conjunction with the 18th International Conference on Human-Computer Interaction (2016)

To be published at the 4th International Conference on Human Aspects of Information Security, Privacy and Trust in conjunction with the 18th International Conference on Human-Computer Interaction (2016)

,

DdabT Tc P[(

Cc i]^h eVeZg i]ZgZ[dgZ* lZ V^b id djia^cZ V [gVbZldg`* hjeedgiZY Wn V egd+ idineZ ^ciZg[VXZ* id Vaadl i]Z bdYZaa^c\ VcY VcVanh^h d[ i]Z hZXjg^in VcY eg^kVXn g^h`h ^c CdM YZeadnbZcih9 i]^h [gVbZldg` Wj^aYh dc VcY hZZ`h id Veean egZk^+ djh gZhZVgX] ^cXajY^c\ djg dlc R/* 0T, ; XZcigVa \dVa d[ i]Z [gVbZldg` ^h id WZ jhVWaZ* i]Vi ^h* id egdk^YZ V h^beaZ VcY ^cij^i^kZ lVn [dg Xdbbdc jhZgh d[ CdM iZX]cdad\n id bdYZa i]Z g^h`h i]Zn bVn [VXZ, PZ hXdeZ i]^h ldg` ZheZX^Vaan id i]Z XdciZmi d[ hbVgi ]dbZh (^,Z,* ]dbZh l^i] YZeadnZY CdM YZk^XZh) [dg ild gZVhdch, @^ghi* i]Z egZkVaZcXZ d[* i]ZgZ[dgZ g^h` [VXZY Wn* i]ZhZ ]dbZh ^h hZi id YgVhi^XVaan ^cXgZVhZ ^c i]Z [jijgZ* bdi^kViZY Wn \dkZgcbZcih (Z,\,* hbVgi bZiZgh ^c i]Z NE)* hjeedgiZY a^k^c\ (Z,\,* ]ZVai]+gZaViZY YZk^XZh)* VcY XdckZc^ZcXZ (Z,\,* hbVgi adX`h VcY a^\]ih), LZXdcYan* lZ WZa^ZkZ i]ZgZ ^h \gZVi kVajZ ^c egdk^Y^c\ V jhVWaZ [gVbZldg` i]Vi XVc ediZci^Vaan WZ ZbeadnZY Wn V kVg^Zin d[ ^cY^k^YjVah (^cXajY^c\ cdc+ZmeZgih) id ]VkZ hdbZ VWhigVXi bdYZa d[ i]Z g^h`h i]Zn bVn [VXZ ^c jh^c\ CdM Vi ]dbZ, M]^h XdjaY ZkZc Vhh^hi l^i] ^hhjZh d[ g^h` VlVgZcZhh (Vh djia^cZY ^c R1T) ^c i]Vi Zck^gdcbZci, Md VX]^ZkZ i]Z \dVah bZci^dcZY VWdkZ* i]^h eVeZg ^h higjXijgZY Vh [daadlh, LZXi^dc 0 l^aa gZ#ZXi dc i]Z gZhZVgX] XdcYjXiZY dc i]Z hbVgi ]dbZ \ZcZgVaan* VcY i]Zc [gdb V hZXjg^in VcY eg^kVXn g^h` eZgheZXi^kZ, M]^h l^aa ]Zae id [dgb Vc jcYZghiVcY^c\ d[ i]Z XjggZci hiViZ d[ i]Z Vgi VcY ]^\]a^\]i `Zn X]VaaZc\Zh id VX]^Zk^c\ hZXjg^in VcY eg^kVXn ^c i]Z hbVgi ]dbZ, LZXi^dc 1 egZhZcih i]Z XdgZ Xdcig^Wji^dc d[ i]Z Vgi^XaZ* ^,Z,* i]Z [gVbZldg`, BZgZ* lZ bdi^kViZ i]Z cZZY [dg hjX] V [gVbZldg`* VcY ^cigdYjXZ i]Z bdYZaa^c\ egdXZhh l]^X] YZ"cZh ^ih, PZ [jgi]Zg ZmeaV^c i]Z XdciZmi l]ZgZ ^i bVn WZ WZhi jhZY* i]Z g^h` bVcV\ZbZci [djcYVi^dc dc l]^X] ^i ^h WVhZY* VcY i]Z `Zn [ZVijgZh a^`Zan id ^cXgZVhZ ^ih jhVW^a+ ^in, HZmi* ^c LZXi^dc 2* lZ Veean i]Z [gVbZldg` id V ]dbZ hXZcVg^d id ZmZbea^[n ]dl ^i XVc WZ jhZY, M]^h hZXi^dc Vahd YZbdchigViZh i]Z ^ciZg[VXZ i]Vi XVc hjeedgi ^cY^k^YjVah ^c i]Z VXijVa Veea^XVi^dc iVh`, LZXi^dc 3 gZ#ZXih dc i]Z [gVbZldg` VcY ^ih \dVah* Vahd Xdch^YZg^c\ i]Z "ghi ^begZhh^dch d[ egdheZXi^kZ jhZgh9 i]^h ^h i]Z ^bedgiVci hiZe d[ [gVbZldg` gZ"cZbZci, @^cVaan* lZ XdcXajYZ VcY egZhZci i]Z cZmi hiZeh ^c i]^h ldg` ^c LZXi^dc 4,

% 3=9 FA5EG =CA9 5B8 >GF F97HE>GK 5B8 DE>I57K E>F?F KZhZVgX] dc hbVgi X^i^Zh VcY hbVgi ]dbZh ]Vh WZZc jcYZg lVn h^cXZ i]Z Xdc+ XZei^dc d[ i]Z CdM ^ihZa[, P]^aZ hbVgi X^i^Zh iZcY id WZ Y^gZXian Yg^kZc Wn \dk+ ZgcbZcih VcY XdgedgVi^dch (Z,\,* hbVgi \g^Yh* igVchedgi VcY lVhiZ XdaaZXi^dc)* hbVgi ]dbZh gZegZhZci V YdbV^c l]ZgZ ejWa^X XdchjbZgh ]VkZ \gZVi X]d^XZ VcY #Zm^W^a^in, ?Vgan gZhZVgX] dc hbVgi ]dbZh hdj\]i id Y^\^iVaan Zc\^cZZg ]dbZ a^[Z Wn egdedh^c\ hZih d[ VYVeiZY Veea^VcXZh a^`Zan id WZ jhZ[ja R2T, M]ZhZ ^cXajYZY hbVgi eZch* lVgYgdWZh* hd[Vh* gZ[g^\ZgVidgh VcY l^cYdlh, L^cXZ i]Vi ldg`* gZ+ hZVgX] ^c i]^h heVXZ ]Vh heZX^Va^hZY* VcY XVc WZ hea^i ^cid i]gZZ `Zn VgZVh8 ]dbZ VjidbVi^dc* ]dbZ bdc^idg^c\ VcY hZXjg^in* VcY Vhh^hiZY a^k^c\, BdbZ VjidbVi^dc [dXjhZh dc higZVba^cZY Xdcigda d[ ]dbZ YZk^XZh hjX] Vh VYVei^kZ a^\]i^c\* ]ZVi^c\ VcY Veea^VcXZh, P]^ahi ^cYjhign ]Vh V^bZY id egdYjXZ XaZVgan YZ"cZY egdYjXih* hjX] Vh i]Z Add\aZ HZhi i]ZgbdhiVi* B G=9 FA5EG =CA9 ; `Zn \dVa djg [gVbZldg` ^h id `ZZe jhZgh ^c adde l^i] gZ\VgYh id i]Z hZXjg^in VcY eg^kVXn g^h`h d[ hbVgi ]dbZ iZX]cdad\^Zh, PZ VeegZX^ViZ i]Vi i]^h ^h cdi V iVh` Vaa jhZgh l^aa WZ ^ciZgZhiZY ^c* ]dlZkZg* [dg i]dhZ cdc+ZmeZgih ^c i]Z ]dbZ i]Vi VgZ VcY ]VkZ WVh^X hZXjg^in VcY eg^kVXn `cdlaZY\Z* i]^h [gVbZldg` XdjaY WZ ZheZX^Vaan jhZ[ja, M]Z [gVbZldg` Xdch^hih d[ V egdXZhh id bdYZa g^h`h i]Vi YgVlh ^che^gVi^dc [gdb hZkZgVa g^h` VhhZhhbZci VeegdVX]Zh R/6T, ;h g^h` bVcV\ZbZci VcY VhhZhhbZci VgZ ZhiVWa^h]ZY "ZaYh l^i] XaZVg egdXZhh VcY higjXijgZ* lZ Yd cdi hZZ` id gZeaVXZ i]Zb* Wji gVi]Zg id egdk^YZ i]^c aVnZg WZilZZc hjX] iZX]c^fjZh VcY jhZgh i]Vi XdjaY Vaadl i]Zb id WZiiZg VeegZX^ViZ i]Z i]gZVih* ViiVX`h VcY gZ+ aViZY g^h`h d[ jh^c\ i]ZhZ ]dbZ YZk^XZh, @^\jgZ / h]dlh djg ]^\]+aZkZa bdYZaa^c\ VeegdVX]* l^i] "kZ iVh`h [dg ]dbZ jhZgh id [daadl, M]ZhZ VgZ (7, *)7, +,!# 3/8/43" $77,87 )3+ 3,89460 )3)1;7/7" '.6,)8 )3+ )88)*0 )3)1;7/7" &/70 +,!3/8/43 )3+ 56/46/8/7)8/43* VcY %438641 +,!3/8/43 )3+ )1/-32,38,

,43! "! 6] ^eTaeXTf ^U cWT UaP\Tf^aZ _a^RTbb c^ \^ST[ aXbZb

Cc YZiV^a* i]Z (7, *)7, +,!3/8/43 iVh` hZZ`h id \Zi jhZgh i]^c`^c\ VWdji i]Z hXZcVg^dh dg jhZh d[ i]Z CdM YZk^XZh ^c i]Z ]dbZ, M]^h XdjaY VYdei V ]^\] aZkZa dg V heZX^"X jhV\Z eZgheZXi^kZ, Md Vhh^hi jhZgh* djg VeegdVX] gZa^Zh dc V hje+ edgi higjXijgZ WVhZY dc h^beaZ fjZhi^dch VcY i]Z egdk^h^dc d[ hZkZgVa ZmVbeaZh (dg fjZhi^dc VchlZgh) Vi ZVX] iVh` aZkZa, @dg i]^h aZkZa* i]Z [jcYVbZciVa fjZh+ i^dch i]Vi ldjaY WZ eaVXZY id jhZgh VgZ8 +3,> =.08,08/0/ >9 =?;;9& +39 ,30 48/4@4/?,6= 48 =?.3 =.08, ,30 =7,%(9* /[email protected]= 9< ;= >3,> =?;;9 >30 ?=0 .,=0& '9A /9 >30=0 /[email protected]= .9880.> 9< A9920>30< !9< =47;6C# A3,> .977?84.,>0= A4>3 A3,>"&

To be published at the 4th International Conference on Human Aspects of Information Security, Privacy and Trust in conjunction with the 18th International Conference on Human-Computer Interaction (2016)

C^ST[[X]V ITRdaXch P]S FaXePRh HXbZb X] cWT I\Pac >^\T

/

Md hjeedgi ^cY^k^YjVah* i]Z [gVbZldg` a^hih hZih d[ YZk^XZh ine^XVaan jhZY ^c i]Z ]dbZ* ^cXajY^c\ hbVgi MOh* Yddg adX`h* VaVgbh* a^\]i^c\* i]ZgbdhiVih* [g^Y\Zh* `ZiiaZh* bdi^dc hZchdgh* hbd`Z YZiZXi^dch* XVbZgVh* VcY ]jWh, Nedc hZaZXi^c\ gZa+ ZkVci YZk^XZh* jhZgh VgZ Vh`ZY id XdccZXi YZk^XZh i]Vi bVn ^ciZgVXi l^i] ZVX] di]Zg, @dg ^chiVcXZ* Vhhjb^c\ i]Z LbVgi Yddg adX` XVhZ* i]Z YZk^XZh jhZY bVn ^cXajYZ i]Z hbVgi adX` VcY Vcn hbVgi e]dcZh i]Vi XdccZXi id ^i, M]Z Xdbbjc^+ XVi^dc YZ"c^i^dc ldjaY ^cXajYZ a^c`h [gdb ZVX] hbVgi e]dcZ id i]Z hbVgi adX` (kZcYdg heZX^"X Vee dc i]Z hbVgi e]dcZ ldjaY YZ"cZ Xdbbjc^XVi^dc heZX^"Xh)9 i]ZhZ VgZ VY ]dX cZildg`h* VcY hXdeZY dcan id i]^h jhZ XVhZ, C[ i]Z ]dbZ jhZg lVh ^ciZgZhiZY ^c bVee^c\ i]Z Zci^gZ LbVgi ]dbZ dg i]Z LbVgi ]dbZ hZXjg^in [ZVijgZh* i]Zn ldjaY Vahd cZZY id Xdch^YZg Vaa i]Z di]Zg YZk^XZh a^c`ZY id i]Z hbVgi e]dcZ* hjX] Vh gdjiZgh* J=h VcY di]Zg hbVgi YZk^XZh, >jg^c\ i]^h iVh`* ]dbZ jhZgh VgZ Vahd Vh`ZY id eg^dg^i^hZ i]Z kVg^djh CdM YZ+ k^XZh ^YZci^"ZY, Mld fjZhi^dch i]Vi i]Z [gVbZldg` edhZh id Vhh^hi ^cY^k^YjVah VgZ8 )8 A34.3 /[email protected]= /9 >30 794@0 /,>, /[email protected]= 7423> 48 >30 20=> 3,30C A0B< G=9 ;E5A9JCE? Md Veean i]Z [gVbZldg`* jhZgh ]VkZ i]Z dei^dc d[ V egdidineZ hjeedgi idda* dg V bdgZ bVcjVa VeegdVX] jh^c\ i]Z YdXjbZciVi^dc egdk^YZY l^i] ZVX] iVh`, Cc i]^h hZXi^dc* lZ YZhXg^WZ VheZXih d[ i]Z idda ^c eVgi^XjaVg* Vadc\ l^i] V h^beaZ ZmVbeaZ d[ ^ih Veea^XVi^dc id V g^h` bdYZaa^c\ hXZcVg^d, M]Z hXZcVg^d ^h dcZ l]ZgZ V ]dbZ jhZg ]Vh ^chiVaaZY V hbVgi Yddg adX` id Xdcigda VXXZhh id i]Z^g ]djhZ, Md XdbbZcXZ bdYZaa^c\* jhZgh deZc i]Z idda VcY XgZViZ V cZl egd_ZXi, @gdb i]ZgZ* i]Zn VgZ Y^gZXiZY id Vc ^ciZg[VXZ [dg MVh` /* ^,Z,* NhZ XVhZ YZ"c^i^dc, Cc @^\, 0 lZ egZhZci ild hXgZZch]dih d[ i]Z MVh` / ^ciZg[VXZ,

,43! #! JPbZ + HXbZ \^ST[[X]V c^^[ X]cTaUPRT( JWT X]cTaUPRT P[[^fb dbTab c^ SaPf ^] _aTST"]TS dbT RPbTb& fWX[bc P[b^ _a^eXSX]V cWT VaP_WXRP[ \^ST[[X]V& P]]^cPcX^] P]S X]U^a\PcX^]'bd__^ac RP_PQX[XcXTb c^ RaPUc cWTXa ^f] RPbTb $Qh bX\_[T SaPV P]S Sa^_%(

;h bZci^dcZY ^c LZXi^dc 1 VcY h]dlc ^c @^\, 0* jhZgh VgZ "ghi egZhZciZY l^i] fjZhi^dch hZije id \j^Y^c\ i]Z iVh`, M]Zn XVc Z^i]Zg hZaZXi [gdb i]Z hZi egZYZ"cZY jhZ XVhZh (^c i]Z YgdeYdlc a^hi YZe^XiZY)* dg Y^gZXian XgZViZ i]Z^g dlc Wn X]ddh^c\ gZaZkVci iZbeaViZ ^iZbh (jhZgh dg jhZ XVhZh) [gdb i]Z hXgdaaVWaZ a^hi id i]Z g^\]i d[ ZVX] ^ciZg[VXZ hXgZZc, A^kZc i]^h hXZcVg^d ^h h^b^aVg id dcZ ^c i]Z egZYZ"cZY hZi* i]Z jhZg YZX^YZY id hZaZXi ^i id WZ\^c bdYZaa^c\, LZaZXi^dc VjidbVi^XVaan edejaViZh i]Z NhZ XVhZ XVckVh (V jhZg+ZY^iVWaZ VgZV) XZcigZ hXgZZc l^i] \gVe]^XVaan YZe^XiZY gZaViZY hXZcVg^dh VcY VYYh egZa^b^cVgn cdiZh, M]Z hXZcVg^dh VYYZY VgZ cdi cZXZhhVg^an ^ciZcYZY id WZ jhZY Vh i]Zn VgZ* Wji ^chiZVY h]djaY (V) ]Zae jhZgh i]^c` VWdji di]Zg eZgi^cZci ^cY^k^YjVah VcY VXi^k+ ^i^Zh (Z,\,* V ]dbZ hZXjg^in Zc\^cZZg dg YZk^XZ ^chiVaaVi^dc)* VcY (W) WZ bdY^"ZY

To be published at the 4th International Conference on Human Aspects of Information Security, Privacy and Trust in conjunction with the 18th International Conference on Human-Computer Interaction (2016)

2

DdabT Tc P[(

id hj^i heZX^"X cZl XVhZh, M]ZgZ[dgZ* i]Z hnhiZb i]Zc egdbeih jhZgh id jeYViZ i]Z hZaZXiZY XVhZh9 i]Zn XVc gZVggVc\Z* YZaZiZ dg VYY cZl ^iZbh id i]Z XVckVh Vh YZh^gZY, Cc i]^h ^chiVcXZ* i]Z jhZg ]Vh bdY^"ZY i]Z ^c^i^Va XVhZ* VcY XgZViZY V bdgZ gZaZkVci dcZ (l^i] V bdi]Zg VcY hdc ^c i]Z ]dbZ* VcY cd di]Zg ^cY^k^YjVah ^ckdakZY l^i] hZije dg edhhZhh^c\ VXXZhh) h]dlc id i]Z g^\]i d[ @^\, 0, C[ jhZgh gZfj^gZ ]Zae dg [jgi]Zg ^c[dgbVi^dc id Vhh^hi ^c i]^h iVh`* i]ZgZ ^h Vc ^c[dgbVi^dc ^Xdc ^c i]Z ide g^\]i d[ ZkZgn hXgZZc, Cc i]Z ;hhZi VcY cZildg` VcVanh^h iVh`* jhZgh VgZ egZhZciZY l^i] V h^b^aVg higjXijgVa ^ciZg[VXZ id i]Vi ^c MVh` /8 l^i] gZaZkVci fjZhi^dch VcY egZYZ"cZY CdM YZk^XZ dei^dch Vi i]Z ide* V a^hi d[ YZk^XZ dei^dch id i]Z g^\]i* V XVckVh ^c i]Z b^YYaZ* eaVXZh id VYY cdiZh* VcY ^c[dgbVi^dc ed^cih, A^kZc i]Vi i]Z LbVgi adX` jhZ XVhZ lVh hZaZXiZY ^c MVh` /* i]Z hnhiZb VjidbVi^XVaan edejaViZh MVh` 0'h XVckVh l^i] V LbVgi adX` VcY ild hbVgi e]dcZh (dcZ [dg ZVX] jhZg)* VcY XgZViZh V XdccZXi^dc [gdb i]Z e]dcZh id i]Z adX`, NhZgh VgZ i]Zc gZfjZhiZY id ZY^i i]Z XVckVh Vh cZXZhhVgn* id Xdch^YZg dc l]^X] YZk^XZh hZch^i^kZ YViV gZh^YZh* VcY l]Vi YZk^XZh bVn aZVY id i]Z \gZViZhi ]Vgb ^[ Xdbegdb^hZY, M]Z idda ]Zaeh jhZgh Wn egZhZci^c\ ediZci^Va VheZXih (Z,\,* XgZYZci^Vah dc hbVgie]dcZh VcY [V^ajgZ d[ i]Z adX` id Vaadl Zcign) i]Vi bVn WZ gZaZkVci Vadc\h^YZ ZVX] YZk^XZ ^Xdc h]dlc, ;ccdiVi^dch VgZ VYYZY id i]Z ^Xdch ^c i]Z XVckVh Wn YdjWaZ Xa^X`^c\ i]Zb9 i]^h Vahd ^cXajYZh i]Z /p1 ^beVXi gVi^c\h, M]Z M]gZVi VcY ViiVX` VcVanh^h iVh` ^h cZmi VcY ^ckdakZh jh^c\ i]Z idda id bdYZa gZaZkVci i]gZVi VXidgh VcY ViiVX`h dc CdM YZk^XZh ^c i]Z ]dbZ, Ljeedgi ^c i]^h iVh` ^h ^c i]Z [dgb d[ VjidbViZY ZmVbeaZh iV^adgZY id i]Z egZk^djhan ^YZci^"ZY CdM YZk^XZh (VhhZih) VcY i]Z ]dbZ'h bV^c jhZgh VcY hiV`Z]daYZgh, LdbZ d[ i]ZhZ ZmVbeaZh VgZ egZhZciZY ^c @^\, 1,

,43! $! JPbZ - HXbZ \^ST[[X]V c^^[ X]cTaUPRT( JWXb X]cTaUPRT Tg_[^aTb& X] ePahX]V [TeT[b ^U STcPX[& cWT cWaTPcb P]S PccPRZb UPRX]V cWT b\Pac W^\T(

Cc i]Z hXgZZch]di id i]Z aZ[i d[ @^\, 1* i]ZgZ VgZ ZmVbeaZh d[ egZhZi ViiVX`h [gdb i]Z [gVbZldg`'h XViVad\jZ l]^X] jhZgh XVc Xjhidb^hZ Vh i]Zn YZh^gZ, @dg ^chiVcXZ* V Xg^b^cVa XdjaY e]nh^XVaan YZhigdn V hbVgi adX`* ediZci^Vaan egZkZci^c\ di]Zg aZ\^i^bViZ jhZgh [gdb VXXZhh^c\ ^i, M]ZgZ ^h Vahd i]Z [VXi i]Vi ^cY^k^YjVah

To be published at the 4th International Conference on Human Aspects of Information Security, Privacy and Trust in conjunction with the 18th International Conference on Human-Computer Interaction (2016)

C^ST[[X]V ITRdaXch P]S FaXePRh HXbZb X] cWT I\Pac >^\T

3

l^i]dji bVcV\ZbZci aZkZa VXXZhh (Z,\,* i]Z ULdc' ^c i]^h XVhZ) bVn jhZ i]Z^g igjhiZY edh^i^dc id [jgi]Zg ZaZkViZ i]Z^g dg di]Zg ^cY^k^YjVah' eg^k^aZ\Zh, Gdhi ^bedgiVcian* i]ZhZ ZmVbeaZh h]djaY \^kZ jhZgh hdbZ ^c^i^Va ^ch^\]i ^cid i]Z ViiVX`h i]Zn bVn [VXZ, ;h l^i] egZk^djh idda ^ciZg[VXZh* i]Zn XVc jhZ i]Z ^iZbh (]ZgZ* i]gZVi VXidgh* ViiVX`h VcY CdM YZk^XZh) dc i]Z g^\]i* id ZY^i dg XdbedhZ VYY^i^dcVa ViiVX`h h]dlc dc i]Z bV^c XVckVh, Md i]Z g^\]i d[ @^\, 1* i]Z ]^\]+aZkZa* hjbbVgn d[ ViiVX`h* i]gZVi VXidgh VcY i]Z CdM hnhiZb ^h egZhZciZY9 i]^h ^h ^ciZcYZY id WZ V h^bea^"ZY kZgh^dc d[ i]Z adl+aZkZa ^ciZg[VXZ (id i]Z aZ[i), NhZgh XVc id\\aZ WZilZZc i]ZhZ ^ciZg[VXZh jh^c\ i]Z UB^\] FZkZa' dg UFdl FZkZa' dei^dch cZmi id i]Z oddb Wjiidc WZadl i]Z XVckVh, ; XZcigVa V^b d[ i]Z [gVbZldg` ^h id Vaadl ^ih jhZgh id WZiiZg jcYZghiVcY VcY bdYZa i]Z g^h`h l]^X] i]Zn [VXZ i]gdj\] i]Z jhZ d[ hbVgi YZk^XZh ^c i]Z ]dbZ, M]Z K^h` YZ"c^i^dc VcY eg^dg^i^hVi^dc iVh` ^h XZcigVa id i]^h, M]Z idda'h jhV\Z ]ZgZ ^h id XdbW^cZ jhZg ^ceji VcY bdYZah egZk^djhan hjeea^ZY* VcY ZcVWaZ jhZgh id VYY [jgi]Zg YViV VWdji ViiVX` a^`Za^]ddY VcY ^beVXi id Veegdeg^ViZan X]VgVXiZg^hZ i]Z g^h`, M]^h ^h VX]^ZkZY i]gdj\] V hZg^Zh d[ egdbeih [dg jhZg ^ceji* l]ZgZ i]Z idda Vh`h [dg Zhi^bViZh gZ\VgY^c\ i]ZhZ VheZXih9 l]^aZ a^b^iZY hjeedgi ^h egdk^YZY ]ZgZ* i]Z idda YdZh gZb^cY jhZgh d[ VhhZih i]Vi lZgZ egZk^djhan ]^\]an eg^dg^i^hZY* Vh i]Z ^beVXi dc i]ZhZ ^[ Xdbegdb^hZY bVn WZ \gZViZg, M]Z gZhjai d[ ZciZg^c\ i]^h YViV ^h V K^h` gZedgi9 Vc ZmVbeaZ d[ l]^X] ^h h]dlc ^c @^\, 2,

,43! %! JPbZ . HXbZ aT_^ac [XbcX]V cWT aXbZb UPRX]V cWT ST"]TS dbT RPbT(

; K^h` gZedgi ^h V a^hi d[ g^h`h* dgYZgZY ^c iZgbh d[ i]Z^g dkZgVaa gVi^c\, ;h h]dlc ^c djg gjcc^c\ ZmVbeaZ ^c @^\, 2* i]Z g^h`h Vadc\ l^i] i]Z^g XdggZhedcY^c\ ^beVXi VcY a^`Za^]ddY gVi^c\h VgZ ZmegZhhZY Vh Vc ZmiZch^dc d[ ZVX] ViiVX`, M]^h Vaadlh i]Z ^cY^k^YjVa bdYZaa^c\ i]Z g^h`h dg V jhZg l^h]^c\ id Xdbbjc^XViZ i]dhZ g^h`h id di]Zgh* id ZVh^an igVX` i]Z^g dg^\^c VcY gZaViZY i]gZVi VXidgh* l]^ahi Vahd k^Zl^c\ di]Zg ViiVX` YZiV^ah, Md hjeedgi Vc VXXZhh^WaZ VcY VXXjgViZ eZgXZei^dc VcY ^ciZgegZiVi^dc d[ g^h`h* lZ jhZ V XdbW^cVi^dc d[ k^hjVa VcY kZgWVa bZhhV\Zh* l^i] Xdadjgh VcY YZhXg^ei^dch [dg g^h`h (^cXajY^c\ ^beVXi VcY a^`Za^]ddY) R/7T, GdgZdkZg* id ZcVWaZ jhZgh id fj^X`an hedi i]Z bdhi hZg^djh g^h`h [VX^c\ i]Z jhZ

To be published at the 4th International Conference on Human Aspects of Information Security, Privacy and Trust in conjunction with the 18th International Conference on Human-Computer Interaction (2016)

+*

DdabT Tc P[(

XVhZh i]Zn ^c^i^Vaan ^YZci^"ZY* i]Z hnhiZb VjidbVi^XVaan dgYZgh g^h`h Wn i]Z^g aZkZah, A^kZc i]Vi i]^h ^h V gZedgi* jhZgh VgZ cdi VWaZ id ZY^i ^i* Wji Vh cZXZhhVgn i]Zn XVc jhZ i]Z S!! MVh` 2& Wjiidc id gZijgc id i]Z egZk^djh hXgZZc, M]Z "cVa iVh` ^h =dcigda YZ"c^i^dc VcY Va^\cbZci, BZgZ* i]Z hnhiZb YgVlh dc egZYZ"cZY bVee^c\h WZilZZc ViiVX`h VcY gZheZXi^kZ XdjciZgbZVhjgZh id hj\\Zhi Vc ^c^i^Va hZi d[ hZXjg^in Xdcigdah [dg i]Z ]dbZ jhZgh id Xdch^YZg, ;h ]^\]a^\]iZY eg^dg* i]ZhZ Xdcigdah VgZ WVhZY dc i]Z IP;LJ =dchjbZg CdM LZXjg^in Aj^YVcXZ YdXjbZciVi^dc R0/T, M]Z XZcigVa idda ^ciZg[VXZ ^h h^b^aVg id @^\, 2* ZmXZei [dg i]Z [VXi i]Vi ^i ^h ZY^iVWaZ VcY ^[ gZaZkVci Xdcigdah ]VkZ WZZc ^YZci^"ZY [dg g^h`h* i]Zn VgZ a^hiZY cZmi id ZVX] g^h`, @dg ^chiVcXZ* Xdch^YZg i]Z ]^\]Zhi gViZY g^h` ^c @^\, 2 l]^X] ^ckdakZh ZaZkVi^dc d[ eg^k^aZ\Zh i]gdj\] VXXZhh^c\ V eg^k^aZ\ZY hbVgi - bdW^aZ YZk^XZ, M]Z gZaViZY IP;LJ \j^YVcXZ XViZ\dgn ^h UC58 CchZXjgZ GdW^aZ CciZg[VXZ'* VcY i]ZgZ[dgZ* hdbZ d[ i]Z Xdcigda dei^dch i]Vi ldjaY WZ hj\\ZhiZY ^cXajYZ8 gZfj^g^c\ V JCH dg eVhhldgY9 jh^c\ ild [VXidg Vji]Zci^XVi^dc (ZkZc W^dbZig^Xh* \^kZc ^ih ^cXgZVhZY egZkVaZcXZ ^c hbVgi e]dcZh)9 VcY ZcVWa^c\ VXXdjci adX`dji [jcXi^dcVa^in, NhZgh XVc YZX^YZ l]^X] dei^dc(h) i]Zn l^h] id ^beaZbZci VcY VYY cdiZh ^c i]Z hnhiZb ^[ i]Zn YZh^gZ, Md [VX^a^iViZ h]Vg^c\ d[ i]Z g^h` bdYZah YZkZadeZY ^c i]Z idda* Vc Zmedgi [jcXi^dc ^h VkV^aVWaZ l]^X] egZhZcih bdYZah h^b^aVg id i]Z^g gZegZhZciVi^dc ^c i]Z ^ciZg[VXZ,

( 19"97G>CB CB ;E5A9JCE? 5B8 HF9EF# !EFG >ADE9FF>CBF M]Z V^b d[ i]^h gZhZVgX] lVh id egdk^YZ V [gVbZldg` VcY hjeedgi^c\ egdidineZ ^ciZg[VXZ id Vaadl i]Z bdYZaa^c\ VcY VcVanh^h d[ i]Z hZXjg^in VcY eg^kVXn g^h`h ^c hbVgi ]dbZ YZeadnbZcih, PZ VX]^ZkZY i]^h V^b Wn Xdch^YZg^c\ i]Z `Zn Xdbed+ cZcih d[ g^h` VcVanhZh, Cc YZkZade^c\ i]^h [gVbZldg`* bV`^c\ i]Z hZXjg^in VcY g^h` bVcV\ZbZci egdXZhh jhVWaZ VcY VXXZhh^WaZ lVh V Xg^i^XVa \dVa, M]^h* lZ WZa^ZkZ* XdjaY bV`Z jcYZghiVcY^c\ i]Z g^h`h l^i] cZl hbVgi YZk^XZh bjX] bdgZ iVc\^WaZ* i]jh ediZci^Vaan gZhjai ^c bdgZ egdVXi^kZ hZXjg^in WZ]Vk^djg, Md VX]^ZkZ i]^h* lZ Wj^ai i]Z [gVbZldg` id egdk^YZ h^bea^"ZY \j^YVcXZ ^c i]Z g^h` VhhZhhbZci egd+ XZhh* VcY hjeedgi k^V hZkZgVa egZYZ"cZY VheZXih (Z,\,* ViiVX`h* i]gZVih), @jgi]Zg hjeedgi lVh VkV^aVWaZ ^c V idda egdidineZ i]Vi ]dbZ jhZgh XdjaY [daadl i]Z bV^c "kZ iVh`h* VcY bdYZa i]Z^g dlc ]djhZ]daYh VcY g^h`h i]Zn [VXZ, PZ YZh^\cZY i]Z egdidineZ l^i] hZXjg^in jhVW^a^in \j^YZa^cZh ^c b^cY* ZheZX^Vaan id WZ VXXZhh^WaZ* l]^aZ hi^aa VhXg^W^c\ id i]Z bV^c VXi^k^i^Zh ^c \ZcZgVa g^h` bVcV\ZbZci R00T, ;ai]dj\] lZ WZa^ZkZ i]Vi i]^h ^h V \ddY hiVgi Vi VYYgZhh^c\ V cdiVWaZ VcY ^cXgZVh^c\an gZaZkVci \Ve ^c hbVgi ]dbZ gZhZVgX] VcY egVXi^XZ* [jgi]Zg ldg` cZZYZY Wdi] dc i]Z [gVbZldg` VcY egdidineZ, IcZ X]VaaZc\Z nZi id WZ iVX`aZY [dg ZmVbeaZ* ^h i]Vi l]^ahi i]Z VWhigVXi bdYZaa^c\ d[ g^h`h VcY ViiVX`h edhh^WaZ l^i] i]Z [gVbZldg` XdjaY ]Zae jcYZghiVcY^c\* l^i]dji Xdch^YZgVi^dc d[ heZX^"X kjacZgVW^a^i^Zh ^c Y^!ZgZci hbVgi YZk^XZh* i]Z VcVanh^h ^h Vg\jVWan a^b^iZY, Bdl lZ XVeijgZ VcY ^cXajYZ i]^h ^c[dgbVi^dc* VcY egZhZci ^i ^c V lVn i]Vi ^h hi^aa VXXZhh^WaZ id ]dbZ jhZgh ^h V fjZhi^dc [dg [jijgZ gZhZVgX], ; gZaViZY X]VaaZc\Z ^h ^c i]Z bVee^c\ d[ hZXjg^in Xdcigdah id g^h`h VcY ViiVX`h p V ]^\]+aZkZa bVee^c\ XVc d!Zg kVajZ ZheZX^Vaan [dg hdbZ ineZh d[ jhZgh* Wji heZX^"X `cdlaZY\Z d[ ViiVX` YZiV^ah (edhh^Wan Vi i]Z =;J?= aZkZa) bVn aZVY id WZiiZg bVee^c\h d[ Xdcigdah,

To be published at the 4th International Conference on Human Aspects of Information Security, Privacy and Trust in conjunction with the 18th International Conference on Human-Computer Interaction (2016)

C^ST[[X]V ITRdaXch P]S FaXePRh HXbZb X] cWT I\Pac >^\T

++

Md \Vi]Zg hdbZ egZa^b^cVgn [ZZYWVX` dc djg [gVbZldg` VcY idda ^ciZg[VXZ* lZ XdcYjXiZY ^c[dgbVa ^ciZgk^Zlh l^i] "kZ ]dbZ iZX]cdad\n jhZgh, M]Z ^ciZgk^Zlh ^ckdakZY ZmeaV^c^c\ i]Z ejgedhZ d[ i]Z [gVbZldg`* YZbdchigVi^c\ ]dl ^i XdjaY WZ jhZY* VcY i]Zc Vaadl^c\ i]Zb id Veean ^i id Vcn hXZcVg^d i]Zn YZh^gZY VcY Vh` fjZhi^dch, IkZgVaa* bdhi jhZgh lZgZ VWaZ id fj^X`an VYdei i]Z egdXZhh* VcY i]Zn [djcY i]Z k^hjVa ^ciZg[VXZ VcY hjeedgi [ZVijgZh (Z,\,* hZaZXi^dc a^hih* VjidbVi^X bVee^c\) jhZ[ja, PZ Y^Y cdi^XZ V [Zl ^hhjZh ^c i]Z [gVbZldg` jhV\Z ]dlZkZg, @dg ^chiVcXZ8 (^) i]Z lVn jhZgh bdYZaaZY VcY a^c`ZY VhhZih* i]gZVih VcY ViiVX`h lVh cdi ValVnh ad\^XVa dg XdggZXi p Z,\,* V Xg^b^cVa hiZVa^c\ hZch^i^kZ YViV [gdb V hbVgi a^\]i9 (^^) jhZgh d[iZc Y^hV\gZZY dc l]Vi YZk^XZh h]djaY (VcY h]djaY cdi) WZ ^cXajYZY ^c V eVgi^XjaVg jhZ XVhZ g^h` VhhZhhbZci9 VcY (^^^) jhZgh [Zai i]Vi [dg XdbeaZm jhZ XVhZh l^i] V kVg^Zin d[ ]dbZ YZk^XZh* i]Z ^ciZg[VXZ bVn cdi hXVaZ lZaa, KZheZXi^kZ gZhjai^c\ ^hhjZh i]Vi l^aa cZZY id WZ VYYgZhhZY i]ZgZ[dgZ ^cXajYZ8 (^) Vaadl^c\ #Zm^W^a^in Wji Vahd ^cigdYjX^c\ [ZVh^W^a^in XdchigV^cih dc bdYZah9 (^^) gZk^Zl^c\ i]Z egdh VcY Xdch id hXde^c\ XVhZ VcY g^h` bdYZah9 VcY (^^^) iZhi^c\ i]Z idda'h VW^a^in id hXVaZ* VcY ediZci^Va Zc]VcXZbZci d[ ^ciZg[VXZ YZh^\ch, M]ZhZ VgZ Vaa VheZXih id WZ jhZY id \j^YZ djg [jijgZ gZhZVgX],

) +CB7@HF>CB 5B8 ;HGHE9 JCE? ;h iZX]cdad\n Xdci^cjZh id eZgbZViZ i]Z ]dbZ* ]dbZ jhZgh VgZ [VX^c\ V h^\c^[+ ^XVci cjbWZg d[ cZl hZXjg^in VcY eg^kVXn g^h`h, M]^h gZhZVgX] V^bZY id egdk^YZ i]Zb l^i] hdbZ ^ch^\]i ^cid i]dhZ g^h`h* k^V i]Z YZ"c^i^dc d[ V g^h` bdYZaa^c\ [gVbZldg` VcY hjeedgi^c\ idda ^ciZg[VXZ, PZ hdj\]i id [gVbZ i]ZhZ VeegdVX]Zh Vh V h^beaZ VcY ^cij^i^kZ lVn [dg jhZgh d[ CdM iZX]cdad\n id bdYZa i]Z g^h`h i]Zn bVn [VXZ ^c i]Z ]dbZ XdciZmi, PZ Vahd Veea^ZY VcY gZ#ZXiZY dc djg ldg`* VcY ]^\]a^\]iZY hdbZ `Zn "ghi ^begZhh^dch [gdb egdheZXi^kZ jhZgh, M]ZhZ gZ#ZXi^dch ^YZci^"ZY hdbZ d[ i]Z bV^c VheZXih l]^X] lZ l^aa hZZ` id iVX`aZ ^c [jijgZ ldg`, JVgi^XjaVgan* i]Z fjZhi^dc d[ ]dl id ^cXajYZ i]Z Veegdeg^ViZ aZkZa d[ YZiV^a hd i]Vi djg idda ^h ]^\]an jhVWaZ VcY hXVaZh lZaa* Wji hi^aa hjeea^Zh ]dbZ jhZgh l^i] i]Z ^c[dgbVi^dc i]Zn cZZY id bV`Z \ddY hZXjg^in YZX^h^dch, IcXZ djg cZmi ^iZgV+ i^dc d[ YZh^\c VcY YZkZadebZci ^h XdbeaZiZ* lZ l^aa XdcYjXi bdgZ YZiV^aZY jhZg iZhi^c\ id ZkVajViZ i]Z gZVa ji^a^in d[ djg egdedhVa,

19;9E9B79F +( IXRPaX& I(& HXiiPaSX& 6(& =aXTR^& B(& 8^T]'F^aXbX]X& 6(4 ITRdaXch& _aXePRh P]S cadbc X] X]cTa]Tc ^U cWX]Vb4 JWT a^PS PWTPS( 8^\_dcTa DTcf^aZb (' $,*+/% +.0j+0. ,( 6cP\[X& 6(& CPacX]& 6(4 JWaTPc'QPbTS bTRdaXch P]P[hbXb U^a cWT X]cTa]Tc ^U cWX]Vb( ?]4 ?]cTa]PcX^]P[ M^aZbW^_ ^] ITRdaT ?]cTa]Tc ^U JWX]Vb $I?^J%& ?;;; $,*+.% -/j.-( 8PeXV[X^]T& B(& BP[P]ST& @(d\P] 6b_TRcb ^U ?]U^a\PcX^] ITRdaXch& FaXePRh& P]S Jadbc( L^[d\T 3+3* ^U BTRcdaT D^cTb X] 8^\_dcTa IRXT]RT( I_aX]VTa $,*+/% +0/j+11 .( FPaZ& I(>(& M^]& I(>(& BTT& @(7(& AX\& I(M(4 I\Pac W^\TjSXVXcP[[h T]VX]TTaTS S^\TbcXR [XUT( FTab^]P[ P]S KQX`dXc^db 8^\_dcX]V ($-'.% $,**-% +23j+30

To be published at the 4th International Conference on Human Aspects of Information Security, Privacy and Trust in conjunction with the 18th International Conference on Human-Computer Interaction (2016)

+,

DdabT Tc P[(

/( >P]& 9(C(& BX\& @(>(4 I\Pac W^\T T]TaVh \P]PVT\T]c bhbcT\ dbX]V XTTT 2*,(+/( . P]S iXVQTT( 8^]bd\Ta ;[TRca^]XRb& ?;;; JaP]bPRcX^]b ^] &'$-% $,*+*% +.*-j+.+* 0( >^d& @(& Md& 8(& NdP]& O(& JP]& @(& MP]V& G(& OW^d& N(4 HTbTPaRW ^U X]cT[[XVT]c W^\T bTRdaXch bdaeTX[[P]RT bhbcT\ QPbTS ^] iXVQTT( ?]4 ?]cTa]PcX^]P[ Ih\_^bXd\ ^] ?]cT[[XVT]c ?]U^a\PcX^] JTRW]^[^Vh 6__[XRPcX^]& ?;;; $,**2% //.j//1 1( FaXhPSWPabWX]X& I(& DXeTcWP& 9(& 6]YP[XZd\PaX& J(& FaPZPbW& F(4 C^QX[T R^]ca^[[TS S^^a [^RZX]V bhbcT\ fXcW cf^'UPRc^a PdcWT]cXRPcX^]( ?]4 Fa^RTTSX]Vb ^U cWT ?]cTa' ]PcX^]P[ 8^]UTaT]RT ^] I^Uc 8^\_dcX]V IhbcT\b& I_aX]VTa $,*+0% +--j+-3 2( 6aRT[db& 6(& @^]Tb& C(>(& =^dQaP]& H(& A]^TUT[& ? 8^]UTaT]RT ^] >d\P] ^\T 9TeXRTb $,*+/% Wcc_4))fff(ZPb_TabZh(R^\)PQ^dc)]Tfb)_aTbb),*+/)IdaeXeX]V'X]'cWT'?^J'f^a[S' APb_TabZh'BPQ';g_Tacb'9XbR^eTa'cWT'HXbZb'^U'I\Pac'>^\T'9TeXRTb( +-( 7db]T[& F(& =Xa^dg& I(4 ITRdaXch& _aXePRh& P]S ST_T]SPQX[Xch X] b\Pac W^\Tb4 P _PccTa] RPcP[^V P__a^PRW( ?]4 6VX]V TP[cW P]S ?]ST_T]' ST]RT( I_aX]VTa $,*+*% ,.j-+ +.( A^ci& 9(& 6eP]RWP& I(& 7PgX& 6(4 6 _aXePRh UaP\Tf^aZ U^a \^QX[T WTP[cW P]S W^\T' RPaT bhbcT\b( ?]4 Fa^RTTSX]Vb ^U cWT "abc 68C f^aZbW^_ ^] ITRdaXch P]S _aXePRh X] \TSXRP[ P]S W^\T'RPaT bhbcT\b& 68C $,**3% +j+, +/( AXaZWP\& J(& 6a\bca^]V& 9(& 9YT\P\T& A(& @XP]V& C(4 HXbZ SaXeT] b\Pac W^\T aTb^daRT \P]PVT\T]c dbX]V R[^dS bTaeXRTb( (4 LXbdP[XiX]V aXbZb4 ?R^]b U^a X]U^a\PcX^] PccPRZ bRT]PaX^b( JTRW]XRP[ aT_^ac& 9J?8 9^Rd\T]c $,***% ,+( EM6IF4 8^]bd\Ta ?^J ITRdaXch =dXSP]RT $,*+/% Wcc_b4))fff(^fPb_(^aV)X]STg(_W_)?^J ITRdaXch =dXSP]RT( ,,( DdabT& @(H(8(& 8aTTbT& I(& =^[Sb\XcW& C(& BP\QTacb& A(4 =dXST[X]Tb U^a dbPQ[T RhQTabTRdaXch4 FPbc P]S _aTbT]c( ?]4 8hQTab_PRT IPUTch P]S ITRdaXch M^aZbW^_ Pc cWT DTcf^aZ P]S IhbcT\ ITRdaXch $DII% 8^]UTaT]RT& ?;;; $,*++% ,+j,0

Suggest Documents