Nudges for privacy and security: Understanding and assisting users' choices online
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …
privacy and security decisions. A growing body of research has investigated individuals' …
Multi-factor authentication: A survey
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …
enablers to maintain this process secure is authentication. It covers many different areas of a …
[HTML][HTML] A survey of emerging threats in cybersecurity
J Jang-Jaccard, S Nepal - Journal of computer and system sciences, 2014 - Elsevier
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …
cyber attack incidents often with disastrous and grievous consequences. Malware is the …
Stories from survivors: Privacy & security practices when co** with intimate partner abuse
We present a qualitative study of the digital privacy and security motivations, practices, and
challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for …
challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for …
[KIRJA][B] Network security: A decision and game-theoretic approach
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …
and risk management, this comprehensive work applies unique quantitative models derived …
Human values, ethics, and design
B Friedman, PH Kahn Jr - The human-computer interaction …, 2007 - taylorfrancis.com
HUMAN VALUES, ETHICS, AND DESIGN Page 1 ◆ 63◆ HUMAN VALUES, ETHICS, AND
DESIGN Batya Friedman and Peter H. Kahn, Jr. University of Washington 1241 Introduction …
DESIGN Batya Friedman and Peter H. Kahn, Jr. University of Washington 1241 Introduction …
Smartphone-based gait recognition: From authentication to imitation
M Muaaz, R Mayrhofer - IEEE Transactions on Mobile …, 2017 - ieeexplore.ieee.org
This work evaluates the security strength of a smartphone-based gait recognition system
against zero-effort and live minimal-effort impersonation attacks under realistic scenarios …
against zero-effort and live minimal-effort impersonation attacks under realistic scenarios …
[HTML][HTML] Learning from safety science: A way forward for studying cybersecurity incidents in organizations
In the aftermath of cybersecurity incidents within organizations, explanations of their causes
often revolve around isolated technical or human events such as an Advanced Persistent …
often revolve around isolated technical or human events such as an Advanced Persistent …
Graphical password authentication using cued click points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-
recall graphical password technique. Users click on one point per image for a sequence of …
recall graphical password technique. Users click on one point per image for a sequence of …
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
F Tari, AA Ozok, SH Holden - Proceedings of the second symposium on …, 2006 - dl.acm.org
Previous research has found graphical passwords to be more memorable than non-
dictionary or" strong" alphanumeric passwords. Participants in a prior study expressed …
dictionary or" strong" alphanumeric passwords. Participants in a prior study expressed …