A design space for effective privacy notices

F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …

Designing effective privacy notices and controls

F Schaub, R Balebako, LF Cranor - IEEE Internet Computing, 2017 - ieeexplore.ieee.org
Privacy notice and choice are essential aspects of privacy and data protection regulation
worldwide. Yet, today's privacy notices and controls are surprisingly ineffective at informing …

How to make privacy policies both GDPR-compliant and usable

K Renaud, LA Shepherd - 2018 International Conference On …, 2018 - ieeexplore.ieee.org
It is important for organisations to ensure that their privacy policies are General Data
Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline …

An experience sampling study of user reactions to browser warnings in the field

RW Reeder, AP Felt, S Consolvo, N Malkin… - Proceedings of the …, 2018 - dl.acm.org
Web browser warnings should help protect people from malware, phishing, and network
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …

Tuning out security warnings

A Vance, JL Jenkins, BB Anderson, DK Bjornn… - MIS Quarterly, 2018 - JSTOR
Research in the fields of information systems and human-computer interaction has shown
that habituation—decreased response to repeated stimulation—is a serious threat to the …

Habituation effects in computer security warning

A Amran, ZF Zaaba… - … security journal: A global …, 2018 - Taylor & Francis
Security warning is a form of computer dialog communication that is used to inform the users
on the risks of allowing random applications to run on a computer system. Accordingly, it is …

An examination of the effect of recent phishing encounters on phishing susceptibility

R Chen, J Gaia, HR Rao - Decision Support Systems, 2020 - Elsevier
This paper examines online users' perceived susceptibility to phishing attacks. We posit that
an individual's phishing susceptibility may be shaped by recent phishing encounters and …

{End-to-End} measurements of email spoofing attacks

H Hu, G Wang - 27th USENIX Security Symposium (USENIX Security …, 2018 - usenix.org
Spear phishing has been a persistent threat to users and organizations, and yet email
providers still face key challenges to authenticate incoming emails. As a result, attackers can …

From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it

BB Anderson, A Vance, CB Kirwan… - Journal of …, 2016 - Taylor & Francis
Warning messages are fundamental to users' security interactions. Unfortunately, they are
largely ineffective, as shown by prior research. A key contributor to this failure is habituation …

How mandatory second factor affects the authentication user experience

J Abbott, S Patil - Proceedings of the 2020 CHI Conference on Human …, 2020 - dl.acm.org
Recent years have seen growing organizational adoption of two-factor authentication as
organizations seek to limit the damage caused by password breaches. However, research …