{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices

I Ion, R Reeder, S Consolvo - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
The state of advice given to people today on how to stay safe online has plenty of room for
improvement. Too many things are asked of them, which may be unrealistic, time …

152 simple steps to stay safe online: Security advice for non-tech-savvy users

RW Reeder, I Ion, S Consolvo - IEEE Security & Privacy, 2017 - ieeexplore.ieee.org
Users often don't follow expert advice for staying secure online, but the reasons for users'
noncompliance are only partly understood. More than 200 security experts were asked for …

Replication: No one can hack my mind revisiting a study on expert and {Non-Expert} security practices and advice

K Busse, J Schäfer, M Smith - … on Usable Privacy and Security (SOUPS …, 2019 - usenix.org
A 2015 study by Iulia Ion, Rob Reeder, and Sunny Consolvo examined the self-reported
security behavior of security experts and non-experts. They also analyzed what kind of …

A comprehensive quality evaluation of security and privacy advice on the web

EM Redmiles, N Warford, A Jayanti, A Koneru… - 29th USENIX Security …, 2020 - usenix.org
End users learn defensive security behaviors from a variety of channels, including a plethora
of security advice given in online articles. A great deal of effort is devoted to getting users to …

So long, and no thanks for the externalities: the rational rejection of security advice by users

C Herley - Proceedings of the 2009 workshop on New security …, 2009 - dl.acm.org
It is often suggested that users are hopelessly lazy and unmotivated on security questions.
They chose weak passwords, ignore security warnings, and are oblivious to certificates …

Guest Editors' Introduction: secure or usable?

LF Cranor, S Garfinkel - IEEE security & privacy, 2004 - ieeexplore.ieee.org
There's an old joke that computers are actually easy machines to secure: just turn them off,
lock them in a metal-lined room, and throw away the key. What you end up with is a machine …

Why do they do what they do?: A study of what motivates users to (not) follow computer security advice

M Fagan, MMH Khan - Twelfth symposium on usable privacy and …, 2016 - usenix.org
Usable security researchers have long been interested in what users do to keep their
devices and data safe and how that compares to recommendations. Additionally, experts …

Scaring and bullying people into security won't work

A Sasse - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Users will pay attention to reliable and credible indicators of risks they want to avoid.
Security mechanisms with a high false positive rate undermine the credibility of security and …

How i learned to be secure: a census-representative survey of security advice sources and behavior

EM Redmiles, S Kross, ML Mazurek - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Few users have a single, authoritative, source from whom they can request digital-security
advice. Rather, digital-security skills are often learned haphazardly, as users filter through …

The effect of social influence on security sensitivity

S Das, THJ Kim, LA Dabbish, JI Hong - 10th Symposium On Usable …, 2014 - usenix.org
Despite an impressive effort at raising the general populace's security sensitivity—the
awareness of, motivation to use, and knowledge of how to use security and privacy tools …