[PDF][PDF] Stress, burnout, and security fatigue in cybersecurity: A human factors problem

C Nobles - Holistica Journal of Business and Public Administration, 2022 - sciendo.com
Stress, burnout, and security fatigue continue as slight destroyers of strong cybersecurity
and significant human factors concerns. The persistence of these human performance …

Examining the efficacy of decoy-based and psychological cyber deception

KJ Ferguson-Walter, MM Major, CK Johnson… - 30th USENIX security …, 2021 - usenix.org
The threat of cyber attacks is a growing concern across the world, leading to an increasing
need for sophisticated cyber defense techniques. Attackers often rely on direct observation …

“Do this! Do that!, And nothing will happen” Do specifications lead to securely stored passwords?

J Hallett, N Patnaik, B Shreeve… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Does the act of writing a specification (how the code should behave) for a piece of security
sensitive code lead to developers producing more secure code? We asked 138 developers …

Permission issues in open-source android apps: An exploratory study

GL Scoccia, A Peruma, V Pujols… - … on Source Code …, 2019 - ieeexplore.ieee.org
Permissions are one of the most fundamental components for protecting an Android user's
privacy and security. Unfortunately, developers frequently misuse permissions by requiring …

Permissions snapshots: Assessing users' adaptation to the Android runtime permission model

P Andriotis, MA Sasse… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
The Android operating system changed its security-and privacy-related permission model
recently, offering its users the ability to control resources that applications are allowed to …

Transferability of privacy-related behaviours to shared smart home assistant devices

VZ Lin, S Parkin - … 7th International Conference on Internet of …, 2020 - ieeexplore.ieee.org
Smart assistant devices (such as Amazon Echo or Google Home) have notable differences
to more conventional consumer computing devices. They can be used through voice control …

Warning users about cyber threats through sounds

P Datta, AS Namin, KS Jones, R Hewett - SN Applied Sciences, 2021 - Springer
This paper reports a formative evaluation of auditory representations of cyber security threat
indicators and cues, referred to as sonifications, to warn users about cyber threats. Most …

A concept proposal on modeling of security fatigue level

S Tanimoto, K Nagai, K Hata… - 2017 5th Intl Conf on …, 2017 - ieeexplore.ieee.org
The threat of cybercrimes has recently increased as the Internet has becomes more of a
necessity. Therefore, the importance of information security is also increasing. In addition to …

Studying users' adaptation to Android's run-time fine-grained access control system

P Andriotis, G Stringhini, MA Sasse - Journal of information security and …, 2018 - Elsevier
The advent of the sixth Android version brought a significant security and privacy
advancement to its users. The platform's security model has changed dramatically, allowing …

Essentials of nursing practice

C Delves-Yates - 2022 - torrossa.com
This book has been written for nursing students undertaking a degree, no matter what area
of nursing practice you are thinking of going into. While the book is primarily aimed at …