
particular message will reach its destination. For this
reason, it is imperative that the E-Tax filing websites
build some form of acknowledgement mechanism
into all transactions. The taxpayer should be
educated to understand that the tax filing has not
been completed until the confirmation number or
acknowledgment is received in return.
6 FUTURE WORK
We feel that in order for an Internet E-Tax system to
be successful, there is a strong need for large-scale
authentication. The IRS and several states have
piloted Public Key Infrastructure (PKI) applications
with some success, but they have also reported
concerns regarding the ability to correctly install and
manage digital certificates. Some tax authorities are
considering becoming certificate authorities
themselves, and assigning key pairs to taxpayers at
no charge. These keys may reside on a server or
personal computer, or they may reside on a card or
some form of token, which must be read at every
transaction. Biometric forms of security and
authentication, such as a fingerprint or retinal scan,
will become inexpensive and widely used.
There is also a need for incorporating
sophisticated logging and auditing capabilities for
user feedback, error detection, error recovery, and
forensic investigation.
Another approach that remains to be tested for E-
Tax filing is allowing the taxpayer to download tax
preparation software from a website to the
taxpayer’s machine. The taxpayer completes the
filing offline, then reconnects to the host website to
upload the completed filing. Advantages of this
method include the ability of the taxpayer to store
the filing on the taxpayer’s machine for future
reference. Disadvantages include the need to
accommodate various versions of the software to
match taxpayer hardware/software configurations,
and the need for customer assistance staff to support
the download and installation processes.
7 CONCLUSIONS
Online E-Tax filing is gaining acceptance in society
but there is still a long way to go. Most tax filing
systems are complex with traditional filing by paper
through the postal mail. Internet filing is a
fundamental change and the reluctance of people to
use such a new system is to be expected. However,
there are features that can be addressed immediately
and effectively in the design of an E-Tax filing
website to encourage security and usability.
In this paper we studied many Internet E-tax
filing websites and identified best practices for
security and usability. We highlighted the
discrepancies between security and usability in E-
Tax filing websites and then addressed the problems
we found by building a prototype E-Tax filing
application to simulate and test our solutions. We
conclude with the primary observation that visible
security mechanisms most effectively bolster user
trust with multiple instances highlighted within our
analysis and prototype.
REFERENCES
Adams, A., Sasse, M. A., December 1999, Users Are Not
the Enemy, Comm. of ACM, Vol 42/No 12.
Ahn, L. V., Blum, M., Langford, J., February 2004, How
Lazy Cryptographers Do AI, Comm. of the ACM, Vol
47/No.2.
AT&T Labs-Research, Beyond Concern: Understanding
Net User’s Attitudes About Online Privacy, Technical
Report, TR 99.4.3
Consumer WebWatch
http://www.consumerwebwatch.org/
Dellarocas, C., 2001, Building Trust On-Line: The Design
of Reliable Reputation Mechanisms for Online Trading
Communities. http://ebusiness.mit.edu
Fogg B.J., 2002, Stanford-Makovsky Web Credibility
Study 2002 Investigating What Makes Web Sites
Credible Today.
Kavassalis, P., Lelis, S., Rafea, M., Haridi, S., February
2004, Telling Humans and Computers Apart
Automatically, Comm. of ACM, Vol 47/No 2.
Nielsen J. Security and Human Factors. Jakob Nielsen’s
Alertbox, November 2000.
http://www.useit.com/alertbox/20001126.html
Nielsen, J., 1994, Heuristic Evaluation In Usability
Inspection Methods, John Wiley & Sons, Inc.
Princeton Survey Research Associates, 2002, A Matter of
Trust: What Users Want From Web Sites, Research
Report.
Turner, C., Zavod, M., and Yurcik, W., 2001, Factors That
Affect The Perception of Security and Privacy of E-
Commerce WebSites, 4th Intl. Conference on
Electronic Commerce Research (ICER-4), Vol 2, pp.
628-636.
Whitten A, Tygar J.D., 1999, Why Johnny Can’t Encrypt:
A Usability Evaluation of PGP 5.0, 9
th
USENIX
Security Symposium.
Yurcik, W., Sharma, A., Doss, D., 2002. False
Impressions: Contrasting Perceptions of Security as a
Major Impediment to Achieving Survivable Systems,
IEEE/CERT/SEI 4th Information Survivability
Workshop (ISW).
ICETE 2004 - SECURITY AND RELIABILITY IN INFORMATION SYSTEMS AND NETWORKS
262