Nudges for privacy and security: Understanding and assisting users' choices online

A Acquisti, I Adjerid, R Balebako… - ACM Computing …, 2017 - dl.acm.org
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

[HTML][HTML] A survey of emerging threats in cybersecurity

J Jang-Jaccard, S Nepal - Journal of computer and system sciences, 2014 - Elsevier
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …

Stories from survivors: Privacy & security practices when co** with intimate partner abuse

T Matthews, K O'Leary, A Turner, M Sleeper… - Proceedings of the …, 2017 - dl.acm.org
We present a qualitative study of the digital privacy and security motivations, practices, and
challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for …

[KIRJA][B] Network security: A decision and game-theoretic approach

T Alpcan, T Başar - 2010 - books.google.com
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …

Human values, ethics, and design

B Friedman, PH Kahn Jr - The human-computer interaction …, 2007 - taylorfrancis.com
HUMAN VALUES, ETHICS, AND DESIGN Page 1 ◆ 63◆ HUMAN VALUES, ETHICS, AND
DESIGN Batya Friedman and Peter H. Kahn, Jr. University of Washington 1241 Introduction …

Smartphone-based gait recognition: From authentication to imitation

M Muaaz, R Mayrhofer - IEEE Transactions on Mobile …, 2017 - ieeexplore.ieee.org
This work evaluates the security strength of a smartphone-based gait recognition system
against zero-effort and live minimal-effort impersonation attacks under realistic scenarios …

[HTML][HTML] Learning from safety science: A way forward for studying cybersecurity incidents in organizations

N Ebert, T Schaltegger, B Ambuehl, L Schöni… - Computers & …, 2023 - Elsevier
In the aftermath of cybersecurity incidents within organizations, explanations of their causes
often revolve around isolated technical or human events such as an Advanced Persistent …

Graphical password authentication using cued click points

S Chiasson, PC Van Oorschot, R Biddle - Computer Security–ESORICS …, 2007 - Springer
We propose and examine the usability and security of Cued Click Points (CCP), a cued-
recall graphical password technique. Users click on one point per image for a sequence of …

A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords

F Tari, AA Ozok, SH Holden - Proceedings of the second symposium on …, 2006 - dl.acm.org
Previous research has found graphical passwords to be more memorable than non-
dictionary or" strong" alphanumeric passwords. Participants in a prior study expressed …