Encouraging employee engagement with cybersecurity: How to tackle cyber fatigue
Cybersecurity fatigue is a form of work disengagement specific to cybersecurity. It manifests
as a weariness or aversion to cybersecurity-related workplace behaviors or advice and …
as a weariness or aversion to cybersecurity-related workplace behaviors or advice and …
A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
Why Eve and Mallory love Android: An analysis of Android SSL (in) security
Many Android apps have a legitimate need to communicate over the Internet and are then
responsible for protecting potentially sensitive data during transit. This paper seeks to better …
responsible for protecting potentially sensitive data during transit. This paper seeks to better …
Alice in warningland: a {Large-Scale} field study of browser security warning effectiveness
We empirically assess whether browser security warnings are as ineffective as suggested by
popular opinion and previous literature. We used Mozilla Firefox and Google Chrome's in …
popular opinion and previous literature. We used Mozilla Firefox and Google Chrome's in …
A comprehensive quality evaluation of security and privacy advice on the web
End users learn defensive security behaviors from a variety of channels, including a plethora
of security advice given in online articles. A great deal of effort is devoted to getting users to …
of security advice given in online articles. A great deal of effort is devoted to getting users to …
{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices
The state of advice given to people today on how to stay safe online has plenty of room for
improvement. Too many things are asked of them, which may be unrealistic, time …
improvement. Too many things are asked of them, which may be unrealistic, time …
Developers are not the enemy!: The need for usable security apis
Rather than recognizing software engineers' limitations, modern security practice has
created an adversarial relationship between security software designers and the developers …
created an adversarial relationship between security software designers and the developers …
A first look at browser-based cryptojacking
S Eskandari, A Leoutsarakos… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
In this paper, we examine the recent trend to-wards in-browser mining of cryptocurrencies; in
particular, the mining of Monero through Coinhive and similar code-bases. In this model, a …
particular, the mining of Monero through Coinhive and similar code-bases. In this model, a …
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …
Cookie banners, what's the purpose? Analyzing cookie banner text through a legal lens
A cookie banner pops up when a user visits a website for the first time, requesting consent to
the use of cookies and other trackers for a variety of purposes. Unlike prior work that has …
the use of cookies and other trackers for a variety of purposes. Unlike prior work that has …