Human factors in phishing attacks: a systematic literature review
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …
trustworthy entity in digital communication. It is a type of cyber attack often successful …
A systematic review on fake news research through the lens of news creation and consumption: Research efforts, challenges, and future directions
Background Although fake news creation and consumption are mutually related and can be
changed to one another, our review indicates that a significant amount of research has …
changed to one another, our review indicates that a significant amount of research has …
{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices
The state of advice given to people today on how to stay safe online has plenty of room for
improvement. Too many things are asked of them, which may be unrealistic, time …
improvement. Too many things are asked of them, which may be unrealistic, time …
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
Smartphone security research has produced many useful tools to analyze the privacy-
related behaviors of mobile apps. However, these automated tools cannot assess people's …
related behaviors of mobile apps. However, these automated tools cannot assess people's …
Folk models of home computer security
R Wash - Proceedings of the Sixth Symposium on Usable …, 2010 - dl.acm.org
Home computer systems are insecure because they are administered by untrained users.
The rise of botnets has amplified this problem; attackers compromise these computers …
The rise of botnets has amplified this problem; attackers compromise these computers …
'No Telling Passcodes Out Because They're Private' Understanding Children's Mental Models of Privacy and Security Online
Children under age 12 increasingly use Internet-connected devices to go online. And while
Internet use exposes people to privacy and security risks, few studies examine how these …
Internet use exposes people to privacy and security risks, few studies examine how these …
[LIBRO][B] Usable security: History, themes, and challenges
S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …
Human Computer Interaction with computer Security, more colloquially known as``usable …
Bridging the gap in computer security warnings: A mental model approach
Computer security warnings are intended to protect users and their computers. However,
research suggests that these warnings might be largely ineffective because they're …
research suggests that these warnings might be largely ineffective because they're …
Why do they do what they do?: A study of what motivates users to (not) follow computer security advice
M Fagan, MMH Khan - Twelfth symposium on usable privacy and …, 2016 - usenix.org
Usable security researchers have long been interested in what users do to keep their
devices and data safe and how that compares to recommendations. Additionally, experts …
devices and data safe and how that compares to recommendations. Additionally, experts …
The phishing funnel model: a design artifact to predict user susceptibility to phishing websites
Phishing is a significant security concern for organizations, threatening employees and
members of the public. Phishing threats against employees can lead to severe security …
members of the public. Phishing threats against employees can lead to severe security …