Human factors in security research: Lessons learned from 2008-2018

M Kaur, M van Eeten, M Janssen, K Borgolte… - arXiv preprint arXiv …, 2021 - arxiv.org
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …

Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia

S Saeed - Sustainability, 2023 - mdpi.com
In the post pandemic era, the telecommuting of business employees has widely become
acceptable in organizations, which demands extensive dependence on digital technologies …

Driving {2FA} adoption at scale: Optimizing {Two-Factor} authentication notification design patterns

M Golla, G Ho, M Lohmus, M Pulluri… - 30th USENIX Security …, 2021 - usenix.org
Two-factor authentication (2FA) is one of the primary mechanisms for defending end-user
accounts against phishing and password reuse attacks. Unfortunately, getting users to adopt …

A world full of privacy and security (mis) conceptions? Findings of a representative survey in 12 countries

F Herbert, S Becker, L Schaewitz, J Hielscher… - Proceedings of the …, 2023 - dl.acm.org
Misconceptions about digital security and privacy topics in the general public frequently lead
to insecure behavior. However, little is known about the prevalence and extent of such …

[PDF][PDF] “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication

JH Klemmer, M Gutfleisch, C Stransky, Y Acar… - 2023 - saschafahl.de
Password-based authentication is the status quo on the web and beyond [6, 13, 14]—
despite its many known problems. This includes challenges around memorizing passwords …

Passworld: A serious game to promote password awareness and diversity in an enterprise

GC Jayakrishnan, GR Sirigireddy… - … Symposium on Usable …, 2020 - usenix.org
Usage of weak passwords for authentication within an organization can be exploited during
cyberattacks leading to unauthorized account access, denial of service, data and identity …

Hybrid password meters for more secure passwords–a comprehensive study of password meters including nudges and password information

V Zimmermann, K Marky, K Renaud - Behaviour & Information …, 2023 - Taylor & Francis
Supporting users with secure password creation is a well-explored yet unresolved research
topic. A promising intervention is the password meter, ie providing feedback on the user's …

Encouraging users to change breached passwords using the protection motivation theory

Y Zou, K Le, P Mayer, A Acquisti, AJ Aviv… - ACM Transactions on …, 2024 - dl.acm.org
We draw on the Protection Motivation Theory (PMT) to design interventions that encourage
users to change breached passwords. Our online experiment () compared the effectiveness …

“taking out the trash”: Why security behavior change requires intentional forgetting

J Hielscher, A Kluge, U Menges… - Proceedings of the 2021 …, 2021 - dl.acm.org
Security awareness is big business–virtually every organization in the Western world
provides some form of awareness or training, mostly bought from external vendors …

Password managers—it's all about trust and transparency

F Alodhyani, G Theodorakopoulos, P Reinecke - Future Internet, 2020 - mdpi.com
A password is considered to be the first line of defence in protecting online accounts, but
there are problems when people handle their own passwords, for example, password reuse …