How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
Users are vital to the information security of organizations. In spite of technical safeguards,
users make many critical security decisions. An example is users' responses to security …
users make many critical security decisions. An example is users' responses to security …
A comprehensive quality evaluation of security and privacy advice on the web
End users learn defensive security behaviors from a variety of channels, including a plethora
of security advice given in online articles. A great deal of effort is devoted to getting users to …
of security advice given in online articles. A great deal of effort is devoted to getting users to …
How to make privacy policies both GDPR-compliant and usable
It is important for organisations to ensure that their privacy policies are General Data
Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline …
Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline …
Using personal examples to improve risk communication for security & privacy decisions
IT security systems often attempt to support users in taking a decision by communicating
associated risks. However, a lack of efficacy as well as problems with habituation in such …
associated risks. However, a lack of efficacy as well as problems with habituation in such …
[BOOK][B] Usable security: History, themes, and challenges
S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …
Human Computer Interaction with computer Security, more colloquially known as``usable …
An experience sampling study of user reactions to browser warnings in the field
Web browser warnings should help protect people from malware, phishing, and network
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …
More harm than good? How messages that interrupt can make us vulnerable
System-generated alerts are ubiquitous in personal computing and, with the proliferation of
mobile devices, daily activity. While these interruptions provide timely information, research …
mobile devices, daily activity. While these interruptions provide timely information, research …
Tales of software updates: The process of updating software
Updates alter the way software functions by fixing bugs, changing features, and modifying
the user interface. Sometimes changes are welcome, even anticipated, and sometimes they …
the user interface. Sometimes changes are welcome, even anticipated, and sometimes they …
How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study
Research on security warnings consistently points to habituation as a key reason why users
ignore security warnings. However, because habituation as a mental state is difficult to …
ignore security warnings. However, because habituation as a mental state is difficult to …
Would a Privacy Fundamentalist Sell Their {DNA} for {$1000... If} Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and …
Westin's Privacy Segmentation Index has been widely used to measure privacy attitudes
and categorize individuals into three privacy groups: fundamentalists, pragmatists, and …
and categorize individuals into three privacy groups: fundamentalists, pragmatists, and …