Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Beckerman C and Williams J. (2025). Privacy Economics: From Information Theory to Privacy as an Asset. Encyclopedia of Cryptography, Security and Privacy. 10.1007/978-3-030-71522-9_1609. (1880-1885).

    https://link.springer.com/10.1007/978-3-030-71522-9_1609

  • Flowerday S and Bhana B. (2025). Security Nudges. Encyclopedia of Cryptography, Security and Privacy. 10.1007/978-3-030-71522-9_1592. (2313-2317).

    https://link.springer.com/10.1007/978-3-030-71522-9_1592

  • Sadeghian A and Otarkhani A. (2023). Data-driven digital nudging: a systematic literature review and future agenda. Behaviour & Information Technology. 10.1080/0144929X.2023.2286535. 43:15. (3834-3862). Online publication date: 17-Nov-2024.

    https://www.tandfonline.com/doi/full/10.1080/0144929X.2023.2286535

  • Lukkien D, Stolwijk N, Ipakchian Askari S, Hofstede B, Nap H, Boon W, Peine A, Moors E and Minkman M. (2024). AI-Assisted Decision-Making in Long-Term Care: Qualitative Study on Prerequisites for Responsible Innovation. JMIR Nursing. 10.2196/55962. 7. (e55962).

    https://nursing.jmir.org/2024/1/e55962

  • Hartwig K, Schmid S, Biselli T, Pleil H and Reuter C. (2024). Misleading information in crises: exploring content-specific indicators on Twitter from a user perspective. Behaviour & Information Technology. 10.1080/0144929X.2024.2373166. (1-34).

    https://www.tandfonline.com/doi/full/10.1080/0144929X.2024.2373166

  • Hartwig K, Biselli T, Schneider F and Reuter C. From Adolescents' Eyes: Assessing an Indicator-Based Intervention to Combat Misinformation on TikTok. Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. (1-20).

    https://doi.org/10.1145/3613904.3642264

  • Clarke J, Mehrnezhad M and Toreini E. (2024). Invisible, Unreadable, and Inaudible Cookie Notices: An Evaluation of Cookie Notices for Users with Visual Impairments. ACM Transactions on Accessible Computing. 17:1. (1-39). Online publication date: 31-Mar-2024.

    https://doi.org/10.1145/3641281

  • Douha N, Renaud K, Taenaka Y and Kadobayashi Y. (2023). Smart home cybersecurity awareness and behavioral incentives. Information & Computer Security. 10.1108/ICS-03-2023-0032. 31:5. (545-575). Online publication date: 16-Nov-2023.

    https://www.emerald.com/insight/content/doi/10.1108/ICS-03-2023-0032/full/html

  • Benthall S and Shekman D. Designing Fiduciary Artificial Intelligence. Proceedings of the 3rd ACM Conference on Equity and Access in Algorithms, Mechanisms, and Optimization. (1-15).

    https://doi.org/10.1145/3617694.3623230

  • Leimstädtner D, Sörries P and Müller-Birn C. Investigating Responsible Nudge Design for Informed Decision-Making Enabling Transparent and Reflective Decision-Making. Proceedings of Mensch und Computer 2023. (220-236).

    https://doi.org/10.1145/3603555.3603567

  • Tadic B, Rohde M, Randall D and Wulf V. (2022). Design Evolution of a Tool for Privacy and Security Protection for Activists Online: Cyberactivist. International Journal of Human–Computer Interaction. 10.1080/10447318.2022.2041894. 39:1. (249-271). Online publication date: 2-Jan-2023.

    https://www.tandfonline.com/doi/full/10.1080/10447318.2022.2041894

  • Zhang Q, Esterwood C, Pradhan A, Tilbury D, Yang X and Robert L. The Impact of Modality, Technology Suspicion, and NDRT Engagement on the Effectiveness of AV Explanations. IEEE Access. 10.1109/ACCESS.2023.3302261. 11. (81981-81994).

    https://ieeexplore.ieee.org/document/10209159/

  • Qu L, Xiao R, Shi W, Huang K, Qin B and Liang B. (2022). Your Behaviors Reveal What You Need. Computers and Security. 122:C. Online publication date: 1-Nov-2022.

    https://doi.org/10.1016/j.cose.2022.102891

  • Reuter C, Iacono L and Benlian A. (2022). A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead. Behaviour & Information Technology. 10.1080/0144929X.2022.2080908. 41:10. (2035-2048). Online publication date: 27-Jul-2022.

    https://www.tandfonline.com/doi/full/10.1080/0144929X.2022.2080908

  • Ferro L, Marrella A, Catarci T, Sapio F, Parenti A and De Santis M. AWATO: A Serious Game to Improve Cybersecurity Awareness. HCI in Games. (508-529).

    https://doi.org/10.1007/978-3-031-05637-6_33

  • Hartwig K and Reuter C. (2021). Nudging users towards better security decisions in password creation using whitebox-based multidimensional visualisations. Behaviour & Information Technology. 10.1080/0144929X.2021.1876167. 41:7. (1357-1380). Online publication date: 19-May-2022.

    https://www.tandfonline.com/doi/full/10.1080/0144929X.2021.1876167

  • H. Tan N, Y. Wong R, Desjardins A, A. Munson S and Pierce J. Monitoring Pets, Deterring Intruders, and Casually Spying on Neighbors: Everyday Uses of Smart Home Cameras. Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. (1-25).

    https://doi.org/10.1145/3491102.3517617

  • Mendel T, Schuster R, Tromer E and Toch E. (2022). Toward Proactive Support for Older Adults. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 6:1. (1-25). Online publication date: 29-Mar-2022.

    https://doi.org/10.1145/3517249

  • Crichton K, Christin N and Cranor L. (2021). How Do Home Computer Users Browse the Web?. ACM Transactions on the Web. 16:1. (1-27). Online publication date: 28-Feb-2022.

    https://doi.org/10.1145/3473343

  • Qu L, Xiao R and Shi W. (2022). Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects. Science of Cyber Security. 10.1007/978-3-031-17551-0_33. (505-521).

    https://link.springer.com/10.1007/978-3-031-17551-0_33

  • Sütterlin S, Lugo R, Ask T, Veng K, Eck J, Fritschi J, Özmen M, Bärreiter B and Knox B. (2022). The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition Skills. Augmented Cognition. 10.1007/978-3-031-05457-0_9. (103-119).

    https://link.springer.com/10.1007/978-3-031-05457-0_9

  • Hartwig K and Reuter C. Nudge or Restraint: How do People Assess Nudging in Cybersecurity - A Representative Study in Germany. Proceedings of the 2021 European Symposium on Usable Security. (141-150).

    https://doi.org/10.1145/3481357.3481514

  • Hartwig K, Englisch A, Thomson J and Reuter C. Finding Secret Treasure? Improving Memorized Secrets Through Gamification. Proceedings of the 2021 European Symposium on Usable Security. (105-117).

    https://doi.org/10.1145/3481357.3481509

  • Smullen D, Yao Y, Feng Y, Sadeh N, Edelstein A and Weiss R. (2021). Managing Potentially Intrusive Practices in the Browser: A User-Centered Perspective. Proceedings on Privacy Enhancing Technologies. 10.2478/popets-2021-0082. 2021:4. (500-527). Online publication date: 1-Oct-2021.. Online publication date: 1-Oct-2021.

    https://www.sciendo.com/article/10.2478/popets-2021-0082

  • Ioannou A, Tussyadiah I and Marshan A. (2021). Dispositional mindfulness as an antecedent of privacy concerns: A protection motivation theory perspective. Psychology & Marketing. 10.1002/mar.21529. 38:10. (1766-1778). Online publication date: 1-Oct-2021.

    https://onlinelibrary.wiley.com/doi/10.1002/mar.21529

  • Branley-Bell D, Gómez Y, Coventry L, Vila J and Briggs P. (2021). Developing and Validating a Behavioural Model of Cyberinsurance Adoption. Sustainability. 10.3390/su13179528. 13:17. (9528).

    https://www.mdpi.com/2071-1050/13/17/9528

  • Franz A, Zimmermann V, Albrecht G, Hartwig K, Reuter C, Benlian A and Vogt J. SoK. Proceedings of the Seventeenth USENIX Conference on Usable Privacy and Security. (339-357).

    /doi/10.5555/3563572.3563590

  • Lopez-Aguilar P and Solanas A. (2021). Human Susceptibility to Phishing Attacks Based on Personality Traits: The Role of Neuroticism 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC). 10.1109/COMPSAC51774.2021.00192. 978-1-6654-2463-9. (1363-1368).

    https://ieeexplore.ieee.org/document/9529789/

  • Elahi H, Castiglione A, Wang G and Geman O. (2021). A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities. Neurocomputing. 10.1016/j.neucom.2020.06.149. 444. (189-202). Online publication date: 1-Jul-2021.

    https://linkinghub.elsevier.com/retrieve/pii/S0925231221001259

  • Qu L, Xiao R, Wang C and Shi W. Design and Evaluation of CFC-targeted Security Nudges. Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. (1-6).

    https://doi.org/10.1145/3411763.3451624

  • Mehrnezhad M and Almeida T. Caring for Intimate Data in Fertility Technologies. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. (1-11).

    https://doi.org/10.1145/3411764.3445132

  • Beckerman C and Williams J. (2021). Privacy Economics: From Information Theory to Privacy as an Asset. Encyclopedia of Cryptography, Security and Privacy. 10.1007/978-3-642-27739-9_1609-1. (1-6).

    http://link.springer.com/10.1007/978-3-642-27739-9_1609-1

  • Flowerday S and Bhana B. (2021). Security Nudges. Encyclopedia of Cryptography, Security and Privacy. 10.1007/978-3-642-27739-9_1592-1. (1-6).

    http://link.springer.com/10.1007/978-3-642-27739-9_1592-1

  • Barev T, Schöbel S, Janson A and Leimeister J. (2021). DELEN – A Process Model for the Systematic Development of Legitimate Digital Nudges. The Next Wave of Sociotechnical Design. 10.1007/978-3-030-82405-1_30. (299-312).

    https://link.springer.com/10.1007/978-3-030-82405-1_30

  • Shou Y and Olney J. (2023). Assessing a domain-specific risk-taking construct: A meta-analysis of reliability of the DOSPERT scale. Judgment and Decision Making. 10.1017/S193029750000694X. 15:1. (112-134). Online publication date: 1-Jan-2020.

    https://www.cambridge.org/core/product/identifier/S193029750000694X/type/journal_article

  • Uehara K, Nishikawa H, Yamamoto T, Kawauchi K and Nishigaki M. (2020). Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted Email. Advanced Information Networking and Applications. 10.1007/978-3-030-44041-1_109. (1278-1290).

    http://link.springer.com/10.1007/978-3-030-44041-1_109

  • Uehara K, Nishikawa H, Yamamoto T, Kawauchi K and Nishigaki M. (2020). Analysis of the Relationship Between Psychological Manipulation Techniques and Personality Factors in Targeted Emails. Advances on Broad-Band Wireless Computing, Communication and Applications. 10.1007/978-3-030-33506-9_30. (338-351).

    http://link.springer.com/10.1007/978-3-030-33506-9_30

  • Warberg L, Acquisti A and Sicker D. Can Privacy Nudges be Tailored to Individuals' Decision Making and Personality Traits?. Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. (175-197).

    https://doi.org/10.1145/3338498.3358656

  • Saleh M, Khamis M and Sturm C. What About My Privacy, Habibi?. Human-Computer Interaction – INTERACT 2019. (67-87).

    https://doi.org/10.1007/978-3-030-29387-1_5

  • Faklaris C, Dabbish L and Hong J. A self-report measure of end-user security attitudes (SA-6). Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security. (61-77).

    /doi/10.5555/3361476.3361481

  • Alomari R, Vargas Martin M, MacDonald S and Bellman C. (2019). Using EEG to Predict and Analyze Password Memorability 2019 IEEE International Conference on Cognitive Computing (ICCC). 10.1109/ICCC.2019.00019. 978-1-7281-2711-8. (42-49).

    https://ieeexplore.ieee.org/document/8817006/

  • Liu X. The Cyber Acumen. Analyzing Human Behavior in Cyberspace. 10.4018/978-1-5225-7128-5.ch011. (192-208).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7128-5.ch011

  • Ndibwile J, Luhanga E, Fall D, Miyamoto D and Kadobayashi Y. A comparative study of smartphone-user security perception and preference towards redesigned security notifications. Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities. (1-6).

    https://doi.org/10.1145/3283458.3283486

  • Alomari R and Vargas Martin M. (2018). Classification of EEG Signals Using Neural Networks to Predict Password Memorability 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). 10.1109/ICMLA.2018.00126. 978-1-5386-6805-4. (791-796).

    https://ieeexplore.ieee.org/document/8614151/

  • Lévesque F, Chiasson S, Somayaji A and Fernandez J. (2018). Technological and Human Factors of Malware Attacks. ACM Transactions on Privacy and Security. 21:4. (1-30). Online publication date: 30-Nov-2018.

    https://doi.org/10.1145/3210311

  • Sur C. (2018). Ensemble one-vs-all learning technique with emphatic & rehearsal training for phishing email classification using psychology. Journal of Experimental & Theoretical Artificial Intelligence. 10.1080/0952813X.2018.1467496. 30:6. (733-762). Online publication date: 2-Nov-2018.

    https://www.tandfonline.com/doi/full/10.1080/0952813X.2018.1467496

  • Pierce J, Fox S, Merrill N and Wong R. (2018). Differential Vulnerabilities and a Diversity of Tactics. Proceedings of the ACM on Human-Computer Interaction. 2:CSCW. (1-24). Online publication date: 1-Nov-2018.

    https://doi.org/10.1145/3274408

  • Sharif M, Urakawa J, Christin N, Kubota A and Yamada A. Predicting Impending Exposure to Malicious Content from User Behavior. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. (1487-1501).

    https://doi.org/10.1145/3243734.3243779

  • Sur C. (2018). DeepSeq: learning browsing log data based personalized security vulnerabilities and counter intelligent measures. Journal of Ambient Intelligence and Humanized Computing. 10.1007/s12652-018-1084-9.

    http://link.springer.com/10.1007/s12652-018-1084-9

  • Ndibwile J, Luhanga E, Fall D, Miyamoto D and Kadobayashi Y. Smart4Gap. Proceedings of the 2018 10th International Conference on Information Management and Engineering. (5-15).

    https://doi.org/10.1145/3285957.3285980

  • Ceross A and Simpson A. Rethinking the Proposition of Privacy Engineering. Proceedings of the New Security Paradigms Workshop. (89-102).

    https://doi.org/10.1145/3285002.3285006

  • Acquisti A, Adjerid I, Balebako R, Brandimarte L, Cranor L, Komanduri S, Leon P, Sadeh N, Schaub F, Sleeper M, Wang Y and Wilson S. (2017). Nudges for Privacy and Security. ACM Computing Surveys. 50:3. (1-41). Online publication date: 31-May-2018.

    https://doi.org/10.1145/3054926

  • Canfield C and Fischhoff B. (2017). Setting Priorities in Behavioral Interventions: An Application to Reducing Phishing Risk. Risk Analysis. 10.1111/risa.12917. 38:4. (826-838). Online publication date: 1-Apr-2018.

    https://onlinelibrary.wiley.com/doi/10.1111/risa.12917

  • Fagan M, Albayram Y, Khan M and Buck R. (2017). An investigation into users' considerations towards using password managers. Human-centric Computing and Information Sciences. 7:1. (1-20). Online publication date: 1-Dec-2017.

    https://doi.org/10.1186/s13673-017-0093-6

  • Pieczul O, Foley S and Zurko M. Developer-centered security and the symmetry of ignorance. Proceedings of the 2017 New Security Paradigms Workshop. (46-56).

    https://doi.org/10.1145/3171533.3171539

  • Mathur A and Chetty M. Impact of user characteristics on attitudes towards automatic mobile application updates. Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security. (175-193).

    /doi/10.5555/3235924.3235939

  • Lévesque F, Fernandez J and Batchelder D. Age and gender as independent risk factors for malware victimisation. Proceedings of the 31st British Computer Society Human Computer Interaction Conference. (1-14).

    https://doi.org/10.14236/ewic/HCI2017.48

  • Sawaya Y, Sharif M, Christin N, Kubota A, Nakarai A and Yamada A. Self-Confidence Trumps Knowledge. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. (2202-2214).

    https://doi.org/10.1145/3025453.3025926

  • Canfield C, Fischhoff B and Davis A. (2016). Quantifying Phishing Susceptibility for Detection and Behavior Decisions. Human Factors: The Journal of the Human Factors and Ergonomics Society. 10.1177/0018720816665025. 58:8. (1158-1172). Online publication date: 1-Dec-2016.

    http://journals.sagepub.com/doi/10.1177/0018720816665025

  • McNamara A, Verma A, Stallings J and Staddon J. Predicting Mobile App Privacy Preferences with Psychographics. Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society. (47-58).

    https://doi.org/10.1145/2994620.2994631

  • Halawa H, Beznosov K, Boshmaf Y, Coskun B, Ripeanu M and Santos-Neto E. Harvesting the low-hanging fruits. Proceedings of the 2016 New Security Paradigms Workshop. (11-22).

    https://doi.org/10.1145/3011883.3011885

  • Torabi S and Beznozov K. Sharing health information on facebook. Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security. (301-320).

    /doi/10.5555/3235895.3235921

  • Mathur A, Engel J, Sobti S, Chang V and Chetty M. "They keep coming back like zombies". Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security. (43-58).

    /doi/10.5555/3235895.3235900

  • Herley C and Pieters W. "If you were attacked, you'd be sorry". Proceedings of the 2015 New Security Paradigms Workshop. (112-123).

    https://doi.org/10.1145/2841113.2841122

  • Pe'er E, Egelman S, Harbach M, Malkin N, Mathur A and Frik A. Nudge Me Right: Personalizing Online Nudges to People's Decision-Making Styles. SSRN Electronic Journal. 10.2139/ssrn.3324907.

    https://www.ssrn.com/abstract=3324907