Human factors in cybersecurity: a scoping review

T Rahman, R Rohan, D Pal… - Proceedings of the 12th …, 2021 - dl.acm.org
Humans are often considered to be the weakest link in the cybersecurity chain. However,
traditionally the Computer Science (CS) researchers have investigated the technical aspects …

“It's common and a part of being a content creator”: Understanding How Creators Experience and Cope with Hate and Harassment Online

K Thomas, PG Kelley, S Consolvo, P Samermit… - Proceedings of the …, 2022 - dl.acm.org
Content creators—social media personalities with large audiences on platforms like
Instagram, TikTok, and YouTube—face a heightened risk of online hate and harassment. We …

The role of institutional and self in the formation of trust in artificial intelligence technologies

LW Wong, GWH Tan, KB Ooi, Y Dwivedi - Internet Research, 2024 - emerald.com
Purpose The deployment of artificial intelligence (AI) technologies in travel and tourism has
received much attention in the wake of the pandemic. While societal adoption of AI has …

Sok: A framework for unifying at-risk user research

N Warford, T Matthews, K Yang, O Akgul… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …

Human factors in security research: Lessons learned from 2008-2018

M Kaur, M van Eeten, M Janssen, K Borgolte… - arXiv preprint arXiv …, 2021 - arxiv.org
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …

Privacy champions in software teams: Understanding their motivations, strategies, and challenges

M Tahaei, A Frik, K Vaniea - Proceedings of the 2021 CHI Conference …, 2021 - dl.acm.org
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …

Users' expectations about and use of smartphone privacy and security settings

A Frik, J Kim, JR Sanchez, J Ma - … of the 2022 CHI Conference on Human …, 2022 - dl.acm.org
With the growing smartphone penetration rate, smartphone settings remain one of the main
models for information privacy and security controls. Yet, their usability is largely …

Exploring age and gender differences in ICT cybersecurity behaviour

D Branley-Bell, L Coventry, M Dixon… - Human Behavior …, 2022 - Wiley Online Library
Known age differences exist in relation to information and communication technology (ICT)
use, attitudes, access, and literacy. Less is known about age differences in relation to …

" Like Lesbians Walking the Perimeter": Experiences of {US}.{LGBTQ+} Folks With Online Security, Safety, and Privacy Advice

C Geeng, M Harris, E Redmiles… - 31st USENIX Security …, 2022 - usenix.org
Given stigma and threats surrounding being gay or transgender, LGBTQ+ folks often seek
support and information on navigating identity and personal (digital and physical) safety …

How do Older Adults feel about engaging with Cyber‐Security?

B Morrison, L Coventry, P Briggs - Human behavior and …, 2021 - Wiley Online Library
Older adults are increasingly a target for cyber‐attacks; however, very little research has
investigated how they feel about engaging in protective cyber‐security behaviors. We …