skip to main content
10.1145/1280680.1280696acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Facemail: showing faces of recipients to prevent misdirected email

Published: 18 July 2007 Publication History

Abstract

Users occasionally send email to the wrong recipients -- clicking Reply To All instead of Reply, mistyping an email address, or guessing an email address and getting it wrong - and suffer violations of security or privacy as a result. Facemail is an extension to a webmail system that aims to alleviate this problem by automatically displaying pictures of the selected recipients in a peripheral display, while the user is composing an email message. We describe techniques for obtaining faces from email addresses, and discovering mailing list memberships from existing web data sources, and a user interface design that keeps important faces recognizable while scaling up to hundreds or thousands of recipients. Preliminary experiments suggest that faces significantly improve users' ability to detect misdirected emails with only a brief glance.

References

[1]
Bolin, M., Webber, M., Rha, P., Wilson, T., and Miller, R. C. Automation and customization of rendered web pages. In Proc. UIST '05, 163--172.
[2]
Brostoff, S. and Sasse, M. A. Are Passfaces more usable than passwords? A field trial investigation. In Proc. HCI 2000, 405--424.
[3]
Culotta, A., Bekkerman, R., and McCallum, A. Extracting social networks and contact information from email and the web. In Proc. CEAS 2004.
[4]
Garfinkel, S. L., Margrave, D., Schiller, J. I., Nordlander, E., and Miller, R. C. How to make secure email easier to use. In Proc. CHI '05, 701--710.
[5]
Garfinkel, S. L. and Miller, R. C. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. In Proc. SOUPS '05, 13--24.
[6]
Gaw, S., Felten, E. W., and Fernandez-Kelly, P. Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In Proc. CHI '06, 591--600.
[7]
Liu, F. and Gleicher, M. Automatic image retargeting with fisheye-view warping. In Proc. UIST '05, 153--162.
[8]
Liu, H., Lieberman, H., and Selker, T. Automatic Affective Feedback in an Email Browser. MIT Media Laboratory Software Agents Group Technical Report, November 2002.
[9]
Sandberg, J. Never a safe feature, 'reply to all' falls into the wrong hands. Wall Street Journal, Oct. 25, 2005.
[10]
Suh, B., Ling, H., Bederson, B. B., and Jacobs, D. W. Automatic thumbnail cropping and its effectiveness. In Proc. UIST 2003, 95--104.
[11]
Tarasewich, P. and Campbell, C. What are you looking at? In Proc. SOUPS 2005.
[12]
Whittaker, S., Jones, Q., Nardi, B., Creech, M., Terveen, L., Isaacs, E., and Hainsworth, J. ContactMap: organizing communication in a social desktop. ACM Transactions on Human-Computer Interaction, 11(4), December 2004, 445--471,
[13]
Whitten, A. and Tygar, J. D. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. In Proc. USENIX Security 1999, 169--184.

Cited By

View all
  • (2022)An open door may tempt a saintProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563631(407-426)Online publication date: 8-Aug-2022
  • (2019)"Wait, Do I Know This Person?"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300520(1-13)Online publication date: 2-May-2019
  • (2017)Viewing the ViewersProceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing10.1145/2998181.2998288(555-566)Online publication date: 25-Feb-2017
  • Show More Cited By

Index Terms

  1. Facemail: showing faces of recipients to prevent misdirected email

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security
    July 2007
    188 pages
    ISBN:9781595938015
    DOI:10.1145/1280680
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • CyLab

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 July 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. email
    2. errors
    3. privacy
    4. reply to all
    5. security

    Qualifiers

    • Article

    Conference

    SOUPS '07
    Sponsor:
    SOUPS '07: The third Symposium on Usable Privacy and Security
    July 18 - 20, 2007
    Pennsylvania, Pittsburgh, USA

    Acceptance Rates

    Overall Acceptance Rate 15 of 49 submissions, 31%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)An open door may tempt a saintProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563631(407-426)Online publication date: 8-Aug-2022
    • (2019)"Wait, Do I Know This Person?"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300520(1-13)Online publication date: 2-May-2019
    • (2017)Viewing the ViewersProceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing10.1145/2998181.2998288(555-566)Online publication date: 25-Feb-2017
    • (2016)To Reply or To Reply AllProceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing10.1145/2818048.2819981(560-569)Online publication date: 27-Feb-2016
    • (2015)A Framework for the Implementation of Secure Bare-Based Web-Email SystemGSTF Journal on Computing (JoC)10.7603/s40601-014-0018-44:3Online publication date: 13-Dec-2015
    • (2015)Peace vs. PrivacyProceedings of the 2015 New Security Paradigms Workshop10.1145/2841113.2841123(124-136)Online publication date: 8-Sep-2015
    • (2015)Towards misdirected email detection based on multi-attributesProceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC)10.1109/ISCC.2015.7405611(796-802)Online publication date: 6-Jul-2015
    • (2014)Usable Security: History, Themes, and ChallengesSynthesis Lectures on Information Security, Privacy, and Trust10.2200/S00594ED1V01Y201408SPT0115:2(1-124)Online publication date: 20-Sep-2014
    • (2014)Computing and Building Around Tie Strength in Social MediaFoundations and Trends in Human-Computer Interaction10.1561/11000000447:3(237-349)Online publication date: 1-Oct-2014
    • (2014)Towards misdirected email detection for preventing information leakage2014 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC.2014.6912554(1-6)Online publication date: Jun-2014
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media