The security & privacy acceptance framework (spaf)

S Das, C Faklaris, JI Hong… - Foundations and Trends …, 2022 - nowpublishers.com
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …

[PDF][PDF] Cross-contextual examination of older adults' privacy concerns, behaviors, and vulnerabilities

Y Zou, K Sun, T Afnan, R Abu-Salma… - Privacy-Enhancing …, 2024 - kclpure.kcl.ac.uk
ABSTRACT A growing body of research has examined the privacy concerns and behaviors
of older adults, often within specific contexts. It remains unclear to what extent older adults' …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arxiv preprint arxiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

The Mundane Art of Cybersecurity: Living with Insecure IT in Danish Small-and Medium-Sized Enterprises

L Kocksch, TE Jensen - Proceedings of the ACM on Human-Computer …, 2024 - dl.acm.org
Small-and medium-sized enterprises (SMEs) are an essential part of the global economy
and paramount to local communities and employment markets. They are also considered to …

[PDF][PDF] 'The trivial tickets build the trust': a co-design approach to understanding security support interactions in a large university

A Demjaha, D Pym, T Caulfield… - Journal of …, 2024 - academic.oup.com
Increasingly, organizations are acknowledging the importance of human factors in the
management of security in workplaces. There are challenges in managing security …

Co-design and modelling of security policy for cultural and behavioural aspects of security in organisations

A Demjaha - 2023 - discovery.ucl.ac.uk
Organisations have historically applied a technology-oriented approach to information
security. However, organisations are increasingly acknowledging the importance of human …

The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image Modifications

J Logas, P Garg, RI Arriaga, S Das - Proceedings of the ACM on Human …, 2024 - dl.acm.org
To resist government and corporate use of facial recognition to surveil users through their
personal images, researchers have created privacy-enhancing image filters that use …

[PDF][PDF] Toward a Socio-Cognitive Stage Model of Cybersecurity Behavior Adoption

C Faklaris - 2022 - researchgate.net
My research looks at how to apply insights from social psychology, marketing, and public
health to reduce the costs of cybercrime and improve adoption of security practices. The …

[PDF][PDF] How a Security Adoption Process Model Might Differ for Information Workers

C Faklaris - researchgate.net
Given the behavioral complexities of cybersecurity, information security workers would
benefit from a model of security practice adoption that is tailored to the organizational …