Human factors in security research: Lessons learned from 2008-2018
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …
into account the human factor by studying regular users and, to a lesser extent, experts like …
Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia
S Saeed - Sustainability, 2023 - mdpi.com
In the post pandemic era, the telecommuting of business employees has widely become
acceptable in organizations, which demands extensive dependence on digital technologies …
acceptable in organizations, which demands extensive dependence on digital technologies …
Driving {2FA} adoption at scale: Optimizing {Two-Factor} authentication notification design patterns
Two-factor authentication (2FA) is one of the primary mechanisms for defending end-user
accounts against phishing and password reuse attacks. Unfortunately, getting users to adopt …
accounts against phishing and password reuse attacks. Unfortunately, getting users to adopt …
A world full of privacy and security (mis) conceptions? Findings of a representative survey in 12 countries
Misconceptions about digital security and privacy topics in the general public frequently lead
to insecure behavior. However, little is known about the prevalence and extent of such …
to insecure behavior. However, little is known about the prevalence and extent of such …
[PDF][PDF] “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication
Password-based authentication is the status quo on the web and beyond [6, 13, 14]—
despite its many known problems. This includes challenges around memorizing passwords …
despite its many known problems. This includes challenges around memorizing passwords …
Passworld: A serious game to promote password awareness and diversity in an enterprise
GC Jayakrishnan, GR Sirigireddy… - … Symposium on Usable …, 2020 - usenix.org
Usage of weak passwords for authentication within an organization can be exploited during
cyberattacks leading to unauthorized account access, denial of service, data and identity …
cyberattacks leading to unauthorized account access, denial of service, data and identity …
Hybrid password meters for more secure passwords–a comprehensive study of password meters including nudges and password information
Supporting users with secure password creation is a well-explored yet unresolved research
topic. A promising intervention is the password meter, ie providing feedback on the user's …
topic. A promising intervention is the password meter, ie providing feedback on the user's …
Encouraging users to change breached passwords using the protection motivation theory
We draw on the Protection Motivation Theory (PMT) to design interventions that encourage
users to change breached passwords. Our online experiment () compared the effectiveness …
users to change breached passwords. Our online experiment () compared the effectiveness …
“taking out the trash”: Why security behavior change requires intentional forgetting
J Hielscher, A Kluge, U Menges… - Proceedings of the 2021 …, 2021 - dl.acm.org
Security awareness is big business–virtually every organization in the Western world
provides some form of awareness or training, mostly bought from external vendors …
provides some form of awareness or training, mostly bought from external vendors …
Password managers—it's all about trust and transparency
F Alodhyani, G Theodorakopoulos, P Reinecke - Future Internet, 2020 - mdpi.com
A password is considered to be the first line of defence in protecting online accounts, but
there are problems when people handle their own passwords, for example, password reuse …
there are problems when people handle their own passwords, for example, password reuse …