peer reviewedThe set of impressions that a user has about distinct aspects of a system depends on the experience perceived while interacting with the system. Considering the effects of these interactions in a security analysis allows for a new class of security properties in terms of misalignments between the system’s technical guarantees and the user’s impressions of them. For instance, a property that we call “false sense of insecurity” identifies a situation in which a secure system injects uncertainty in users, thus improperly transmitting the degree of protection that it actually provides; another, which we call “false sense of security”, captures situations in which a system instills a false sense of security beyond what a technical a...
The need to ensure the primary functionality of any system means that considerations of security are...
It is possible to reasonably measure the security quality of individual security patterns. However, ...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
The set of impressions that a user has about distinct aspects of a system depends on the experience ...
This document is the Accepted Manuscript of a conference paper published in Proceedings of the Cambr...
Information security-related research is traditionally focused on technical aspects, while little at...
When communication about security to end users is ineffective, people frequently misinterpret the pr...
Nowadays, the possibility to communicate securely is crucial for users in the private as well as in ...
This research focuses on the development of a model for evaluating the human impact that password au...
Inadvertent and Irrational human errors (e.g., clicking on phishing emails) have been the primary ca...
This paper presents an analysis of recent transformations in cyber security assurance, a field of ev...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
Social engineering attacking method is a serious threat that targets the human element of informatio...
With more and more open systems connected to the Internet security is perhaps the most important att...
Personas are a common tool used in Human Computer Interaction to represent the needs and expectation...
The need to ensure the primary functionality of any system means that considerations of security are...
It is possible to reasonably measure the security quality of individual security patterns. However, ...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
The set of impressions that a user has about distinct aspects of a system depends on the experience ...
This document is the Accepted Manuscript of a conference paper published in Proceedings of the Cambr...
Information security-related research is traditionally focused on technical aspects, while little at...
When communication about security to end users is ineffective, people frequently misinterpret the pr...
Nowadays, the possibility to communicate securely is crucial for users in the private as well as in ...
This research focuses on the development of a model for evaluating the human impact that password au...
Inadvertent and Irrational human errors (e.g., clicking on phishing emails) have been the primary ca...
This paper presents an analysis of recent transformations in cyber security assurance, a field of ev...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
Social engineering attacking method is a serious threat that targets the human element of informatio...
With more and more open systems connected to the Internet security is perhaps the most important att...
Personas are a common tool used in Human Computer Interaction to represent the needs and expectation...
The need to ensure the primary functionality of any system means that considerations of security are...
It is possible to reasonably measure the security quality of individual security patterns. However, ...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...