+1 Recommend
1 collections
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Faceless Internet Lawyers – Can They Be Trusted? A study of Usable Security for Legal Services



      Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI)

      Human Computer Interaction Conference

      4 - 6 July 2018

      Usability, Security, Usable security, Legal Services



            Details on the context and background of work: Legal service has lagged behind other online services this is because lawyers are traditional risk adverse, trained to poke holes in ideas and look to the past for how things should be done. There have been many articles wrote about client confidentiality and solicitors duty of care, that have expressed a concern about internet safety. Having the clients trust and actually being trustworthy is of the utmost important to our legal system, if we are to move legal service on-line. We need to understand how we can design a system, that is both? A system that not only feels safe and secure but actually is. A system that is a joy to use and can be trusted the way that you would trust your solicitor, enabling the sharing of sensitive correspondence with the convenience of never having to leave your home. Usable security, maybe the answer to this but it is a relatively new field in computer science and has provided some good theories that could be applied to legal services, yet there have been very few actual case studies.


            Author and article information

            July 2018
            July 2018
            : 1-6
            [0001]PhD student School of Computer Science University of Sunderland
            © Whittle. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2018. Belfast, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 32nd International BCS Human Computer Interaction Conference
            Belfast, UK
            4 - 6 July 2018
            Electronic Workshops in Computing (eWiC)
            Human Computer Interaction Conference
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Electronic Workshops in Computing


            1. 2016 You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users In: 2016 IEEE Cybersecurity Development (SecDev) November 2016 3 8

            2. Anon 2017 Capturing Technological Innovation in Legal Services report - The Law Society [Online]. 25 January 2017. Capturing Technological Innovation in Legal Services. Available from: http://www.lawsociety.org.uk/support-services/research-trends/capturing-technological-innovation-report/. [Accessed: 10 May 2017]

            3. 2005 Are the Drivers and Role of Online Trust the Same for All Web Sites and Consumers? A Large-Scale Exploratory Empirical Study Journal of Marketing 69 4 133 152

            4. 2016 Barriers to Usable Security? Three Organizational Case Studies IEEE Security Privacy 14 5 22 32

            5. 2018 The 4 Dimensions of Digital Trust, Charted Across 42 Countries Harvard Business Review Digital Articles 2 8

            6. 2016 Global Differences in Online Shopping Behavior: Understanding Factors Leading to Trust Journal of Management Information Systems 33 4 1117 1148

            7. 2017 Is a „smart contract‟ really a smart idea? Insights from a legal perspective Computer Law & Security Review 33 6 825 835

            8. 2017 Trust and mobile commerce in North America Computers in Human Behavior 70 10 21

            9. 2018 Research handbook on behavioral law and economics. Research handbooks in law and economics series Northampton, MA Edward Elgar Pub

            10. 2016 The simulated security assessment ecosystem: Does penetration testing need standardisation? Computers & Security 62 296 316

            11. 2001 A Trust Model for Consumer Internet Shopping International Journal of Electronic Commerce 6 1 75

            12. 2017 Full length article: Modelling and testing consumer trust dimensions in e-commerce Computers in Human Behavior 71 153 164

            13. 2016 Exploring context-sensitive data flow analysis for early vulnerability detection The Journal of Systems & Software 113 337 361

            14. (n.d.) Elevation of Privilege: Drawing Developers into Threat Modeling 12

            15. 2015 Lawyers and Innovation:Waiting for Einstein In: 2. [Online]. 2015, The Professional Lawyer, p. 12. Available from: http://www.americanbar.org/publications/professional_lawyer/2015/volume_23_number_2/lawyers_and_innovation_waiting_einstein.html. [Accessed: 1 September 2017]

            16. 2017 Smart will converting the legal testament into a smart contract In: 2017 International Conference on Networks Advances in Computational Technologies (NetACT) July 2017 203 207

            17. 2017 Brains or Beauty: How to Engender Trust in User-Agent Interactions ACM Transactions on Internet Technology 17 1 1 20

            18. 2017 When trust comes easy: Articulatory fluency increases transfers in the trust game Journal of Economic Psychology 61 74 86


            Comment on this article