A design space for effective privacy notices
F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
Designing effective privacy notices and controls
Privacy notice and choice are essential aspects of privacy and data protection regulation
worldwide. Yet, today's privacy notices and controls are surprisingly ineffective at informing …
worldwide. Yet, today's privacy notices and controls are surprisingly ineffective at informing …
How to make privacy policies both GDPR-compliant and usable
K Renaud, LA Shepherd - 2018 International Conference On …, 2018 - ieeexplore.ieee.org
It is important for organisations to ensure that their privacy policies are General Data
Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline …
Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline …
An experience sampling study of user reactions to browser warnings in the field
Web browser warnings should help protect people from malware, phishing, and network
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …
Tuning out security warnings
Research in the fields of information systems and human-computer interaction has shown
that habituation—decreased response to repeated stimulation—is a serious threat to the …
that habituation—decreased response to repeated stimulation—is a serious threat to the …
Habituation effects in computer security warning
Security warning is a form of computer dialog communication that is used to inform the users
on the risks of allowing random applications to run on a computer system. Accordingly, it is …
on the risks of allowing random applications to run on a computer system. Accordingly, it is …
An examination of the effect of recent phishing encounters on phishing susceptibility
This paper examines online users' perceived susceptibility to phishing attacks. We posit that
an individual's phishing susceptibility may be shaped by recent phishing encounters and …
an individual's phishing susceptibility may be shaped by recent phishing encounters and …
{End-to-End} measurements of email spoofing attacks
Spear phishing has been a persistent threat to users and organizations, and yet email
providers still face key challenges to authenticate incoming emails. As a result, attackers can …
providers still face key challenges to authenticate incoming emails. As a result, attackers can …
From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it
Warning messages are fundamental to users' security interactions. Unfortunately, they are
largely ineffective, as shown by prior research. A key contributor to this failure is habituation …
largely ineffective, as shown by prior research. A key contributor to this failure is habituation …
How mandatory second factor affects the authentication user experience
Recent years have seen growing organizational adoption of two-factor authentication as
organizations seek to limit the damage caused by password breaches. However, research …
organizations seek to limit the damage caused by password breaches. However, research …