Encouraging employee engagement with cybersecurity: How to tackle cyber fatigue

A Reeves, P Delfabbro, D Calic - SAGE open, 2021 - journals.sagepub.com
Cybersecurity fatigue is a form of work disengagement specific to cybersecurity. It manifests
as a weariness or aversion to cybersecurity-related workplace behaviors or advice and …

A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

Why Eve and Mallory love Android: An analysis of Android SSL (in) security

S Fahl, M Harbach, T Muders, L Baumgärtner… - Proceedings of the …, 2012 - dl.acm.org
Many Android apps have a legitimate need to communicate over the Internet and are then
responsible for protecting potentially sensitive data during transit. This paper seeks to better …

Alice in warningland: a {Large-Scale} field study of browser security warning effectiveness

D Akhawe, AP Felt - … USENIX Security Symposium (USENIX Security 13), 2013 - usenix.org
We empirically assess whether browser security warnings are as ineffective as suggested by
popular opinion and previous literature. We used Mozilla Firefox and Google Chrome's in …

A comprehensive quality evaluation of security and privacy advice on the web

EM Redmiles, N Warford, A Jayanti, A Koneru… - 29th USENIX Security …, 2020 - usenix.org
End users learn defensive security behaviors from a variety of channels, including a plethora
of security advice given in online articles. A great deal of effort is devoted to getting users to …

{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices

I Ion, R Reeder, S Consolvo - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
The state of advice given to people today on how to stay safe online has plenty of room for
improvement. Too many things are asked of them, which may be unrealistic, time …

Developers are not the enemy!: The need for usable security apis

M Green, M Smith - IEEE Security & Privacy, 2016 - ieeexplore.ieee.org
Rather than recognizing software engineers' limitations, modern security practice has
created an adversarial relationship between security software designers and the developers …

A first look at browser-based cryptojacking

S Eskandari, A Leoutsarakos… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
In this paper, we examine the recent trend to-wards in-browser mining of cryptocurrencies; in
particular, the mining of Monero through Coinhive and similar code-bases. In this model, a …

SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements

J Clark, PC Van Oorschot - 2013 IEEE Symposium on Security …, 2013 - ieeexplore.ieee.org
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …

Cookie banners, what's the purpose? Analyzing cookie banner text through a legal lens

C Santos, A Rossi, L Sanchez Chamorro… - Proceedings of the 20th …, 2021 - dl.acm.org
A cookie banner pops up when a user visits a website for the first time, requesting consent to
the use of cookies and other trackers for a variety of purposes. Unlike prior work that has …