How users perceive and respond to security messages: a NeuroIS research agenda and empirical study

B Brinton Anderson, A Vance, CB Kirwan… - European Journal of …, 2016 - Taylor & Francis
Users are vital to the information security of organizations. In spite of technical safeguards,
users make many critical security decisions. An example is users' responses to security …

A comprehensive quality evaluation of security and privacy advice on the web

EM Redmiles, N Warford, A Jayanti, A Koneru… - 29th USENIX Security …, 2020 - usenix.org
End users learn defensive security behaviors from a variety of channels, including a plethora
of security advice given in online articles. A great deal of effort is devoted to getting users to …

How to make privacy policies both GDPR-compliant and usable

K Renaud, LA Shepherd - 2018 International Conference On …, 2018 - ieeexplore.ieee.org
It is important for organisations to ensure that their privacy policies are General Data
Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline …

Using personal examples to improve risk communication for security & privacy decisions

M Harbach, M Hettig, S Weber, M Smith - Proceedings of the SIGCHI …, 2014 - dl.acm.org
IT security systems often attempt to support users in taking a decision by communicating
associated risks. However, a lack of efficacy as well as problems with habituation in such …

[BOOK][B] Usable security: History, themes, and challenges

S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …

An experience sampling study of user reactions to browser warnings in the field

RW Reeder, AP Felt, S Consolvo, N Malkin… - Proceedings of the …, 2018 - dl.acm.org
Web browser warnings should help protect people from malware, phishing, and network
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …

More harm than good? How messages that interrupt can make us vulnerable

JL Jenkins, BB Anderson, A Vance… - Information Systems …, 2016 - pubsonline.informs.org
System-generated alerts are ubiquitous in personal computing and, with the proliferation of
mobile devices, daily activity. While these interruptions provide timely information, research …

Tales of software updates: The process of updating software

K Vaniea, Y Rashidi - Proceedings of the 2016 chi conference on human …, 2016 - dl.acm.org
Updates alter the way software functions by fixing bugs, changing features, and modifying
the user interface. Sometimes changes are welcome, even anticipated, and sometimes they …

How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study

BB Anderson, CB Kirwan, JL Jenkins, D Eargle… - Proceedings of the 33rd …, 2015 - dl.acm.org
Research on security warnings consistently points to habituation as a key reason why users
ignore security warnings. However, because habituation as a mental state is difficult to …

Would a Privacy Fundamentalist Sell Their {DNA} for {$1000... If} Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and …

A Woodruff, V Pihur, S Consolvo… - 10th Symposium On …, 2014 - usenix.org
Westin's Privacy Segmentation Index has been widely used to measure privacy attitudes
and categorize individuals into three privacy groups: fundamentalists, pragmatists, and …