Compliance with information security policies: An empirical investigation

M Siponen, S Pahnila, MA Mahmood - Computer, 2010 - ieeexplore.ieee.org
Information security was the main topic in this paper. An investigation of the compliance to
information security policies were discussed. The author mentions that the insignificant …

Influencing users towards better passwords: persuasive cued click-points

S Chiasson, A Forget, R Biddle… - … and Computers XXII …, 2008 - scienceopen.com
Usable security has unique usability challenges because the need for security often means
that standard human-computerinteraction approaches cannot be directly applied. An …

Toward a new meta-theory for designing information systems (IS) security training approaches

M Karjalainen, M Siponen - Journal of the Association for …, 2011 - aisel.aisnet.org
Employees' non-compliance with IS security procedures is a key concern for organizations.
To tackle this problem, there exist several training approaches aimed at changing …

Improving text passwords through persuasion

A Forget, S Chiasson, PC Van Oorschot… - Proceedings of the 4th …, 2008 - dl.acm.org
Password restriction policies and advice on creating secure passwords have limited effects
on password strength. Influencing users to create more secure passwords remains an open …

A design theory-based gamification approach for information security training

TA Nguyen, H Pham - 2020 RIVF international conference on …, 2020 - ieeexplore.ieee.org
This study reviews previous information security (InfoSec) training studies and identifies
three significant gaps. They are (1) lacking pedagogical theories developed specifically in IS …

Improving passwords: Influence of emotions on security behaviour

I Gulenko - Information Management & Computer Security, 2014 - emerald.com
Purpose–This paper aims to study the influence of emotions on security behaviour by
reviewing Information Systems Security (ISS) topics in Information Systems (IS) literature …

Persuasion for stronger passwords: Motivation and pilot study

A Forget, S Chiasson, PC Van Oorschot… - … PERSUASIVE 2008, Oulu …, 2008 - Springer
Text passwords are the ubiquitous method of authentication, used by most people for most
online services. Many people choose weak passwords that are vulnerable to attackers who …

[PDF][PDF] Usable authentication and click-based graphical passwords

S Chiasson - 2009 - repository.library.carleton.ca
" Humans are incapable of securely storing high-quality cryptographic keys, and they have
unacceptable speed and accuracy when performing cryptographic operations.(They are …

[PDF][PDF] A world with many authentication schemes

A Forget - 2013 - repository.library.carleton.ca
Usability and security challenges with standard text passwords have led researchers and
professionals to consider alternative authentication schemes. This thesis explores the …

Persuasive technology for improving information security awareness and behavior: literature review

MA Bawazir, M Mahmud, NNA Molok… - 2016 6th International …, 2016 - ieeexplore.ieee.org
The use of Persuasive Technology in various fields is rapidly increasing. It can be applied in
many fields such as computing, marketing, sales, environment, education, and health …