A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …
exploitations that employ a variety of attack vectors and strategies to psychologically …
The role of user behaviour in improving cyber security management
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …
engineering, and information communications technology. The term 'information security'has …
A design space for effective privacy notices
F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
Training to mitigate phishing attacks using mindfulness techniques
Phishing attacks are at a record high and are causing billions of dollars in losses. To
mitigate phishing's impact, organizations often use rule-based training to teach individuals to …
mitigate phishing's impact, organizations often use rule-based training to teach individuals to …
The role of uncertainty, awareness, and trust in visual analytics
Visual analytics supports humans in generating knowledge from large and often complex
datasets. Evidence is collected, collated and cross-linked with our existing knowledge. In the …
datasets. Evidence is collected, collated and cross-linked with our existing knowledge. In the …
SoK: secure messaging
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …
many solutions now claim to offer secure and private messaging. This includes both a large …
An experience sampling study of user reactions to browser warnings in the field
Web browser warnings should help protect people from malware, phishing, and network
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …
A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
More harm than good? How messages that interrupt can make us vulnerable
System-generated alerts are ubiquitous in personal computing and, with the proliferation of
mobile devices, daily activity. While these interruptions provide timely information, research …
mobile devices, daily activity. While these interruptions provide timely information, research …
Put your warning where your link is: Improving and evaluating email phishing warnings
Phishing emails often disguise a link's actual URL. Thus, common anti-phishing advice is to
check a link's URL before clicking, but email clients do not support this well. Automated …
check a link's URL before clicking, but email clients do not support this well. Automated …