Human factors in cybersecurity: a scoping review
Humans are often considered to be the weakest link in the cybersecurity chain. However,
traditionally the Computer Science (CS) researchers have investigated the technical aspects …
traditionally the Computer Science (CS) researchers have investigated the technical aspects …
“It's common and a part of being a content creator”: Understanding How Creators Experience and Cope with Hate and Harassment Online
Content creators—social media personalities with large audiences on platforms like
Instagram, TikTok, and YouTube—face a heightened risk of online hate and harassment. We …
Instagram, TikTok, and YouTube—face a heightened risk of online hate and harassment. We …
The role of institutional and self in the formation of trust in artificial intelligence technologies
Purpose The deployment of artificial intelligence (AI) technologies in travel and tourism has
received much attention in the wake of the pandemic. While societal adoption of AI has …
received much attention in the wake of the pandemic. While societal adoption of AI has …
Sok: A framework for unifying at-risk user research
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
Human factors in security research: Lessons learned from 2008-2018
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …
into account the human factor by studying regular users and, to a lesser extent, experts like …
Privacy champions in software teams: Understanding their motivations, strategies, and challenges
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …
Users' expectations about and use of smartphone privacy and security settings
With the growing smartphone penetration rate, smartphone settings remain one of the main
models for information privacy and security controls. Yet, their usability is largely …
models for information privacy and security controls. Yet, their usability is largely …
Exploring age and gender differences in ICT cybersecurity behaviour
Known age differences exist in relation to information and communication technology (ICT)
use, attitudes, access, and literacy. Less is known about age differences in relation to …
use, attitudes, access, and literacy. Less is known about age differences in relation to …
" Like Lesbians Walking the Perimeter": Experiences of {US}.{LGBTQ+} Folks With Online Security, Safety, and Privacy Advice
C Geeng, M Harris, E Redmiles… - 31st USENIX Security …, 2022 - usenix.org
Given stigma and threats surrounding being gay or transgender, LGBTQ+ folks often seek
support and information on navigating identity and personal (digital and physical) safety …
support and information on navigating identity and personal (digital and physical) safety …
How do Older Adults feel about engaging with Cyber‐Security?
Older adults are increasingly a target for cyber‐attacks; however, very little research has
investigated how they feel about engaging in protective cyber‐security behaviors. We …
investigated how they feel about engaging in protective cyber‐security behaviors. We …