A wide-range of personal and sensitive information are stored in users’ online accounts. Losing access, or an unauthorized access to one of those accounts could put them into the risks of privacy breach, cause financial loss, and compromise their accessibility to important information and documents. A large body of prior work focused on developing new schemes and strategies to protect users’ online security. However, there is a dearth in existing literature to understand users’ strategies and contingency plans to protect their online accounts once they lose access, or identify an unauthorized access to one of their accounts. We addressed this gap in our work, where we conducted semi-structured interview with 59 participants from three diffe...
Identity theft has become one of the fastest growing white collar crimes in the world. It occurs whe...
Smartphones are the most popular personal electronic devices. They are used for all sorts of purpose...
Privacy and security tools and strategies are not equally effective for everyone---many high-risk co...
The goal of this study is to understand the behavior of users from developing countries in managing ...
A person's online security setup is tied to the security of their individual accounts. Some accounts...
With so much of our lives digital, online, and not entirely under our control, we risk losing access...
The rapid development of online learning is opening up many new learning opportunities. Yet, with th...
Internet users permanently balance the benefits of information disclosure and the risk of privacy in...
Internet access continues to increase among the youth in developing countries, like South Africa, du...
Reports of identity theft continue to be widely reported, while users continue to share an increasin...
As much as consumers express desires to safeguard their online privacy, they often fail to do so eff...
My dissertation focuses on understanding users’ coping with information privacy threats in Online So...
Using the Protection Motivation Theory, the paper tests a model password protection intention of onl...
This article examines online behaviors that increase or reduce risk of online identity theft The aut...
Identity theft has become one of the fastest growing white collar crimes in the world. It occurs whe...
Identity theft has become one of the fastest growing white collar crimes in the world. It occurs whe...
Smartphones are the most popular personal electronic devices. They are used for all sorts of purpose...
Privacy and security tools and strategies are not equally effective for everyone---many high-risk co...
The goal of this study is to understand the behavior of users from developing countries in managing ...
A person's online security setup is tied to the security of their individual accounts. Some accounts...
With so much of our lives digital, online, and not entirely under our control, we risk losing access...
The rapid development of online learning is opening up many new learning opportunities. Yet, with th...
Internet users permanently balance the benefits of information disclosure and the risk of privacy in...
Internet access continues to increase among the youth in developing countries, like South Africa, du...
Reports of identity theft continue to be widely reported, while users continue to share an increasin...
As much as consumers express desires to safeguard their online privacy, they often fail to do so eff...
My dissertation focuses on understanding users’ coping with information privacy threats in Online So...
Using the Protection Motivation Theory, the paper tests a model password protection intention of onl...
This article examines online behaviors that increase or reduce risk of online identity theft The aut...
Identity theft has become one of the fastest growing white collar crimes in the world. It occurs whe...
Identity theft has become one of the fastest growing white collar crimes in the world. It occurs whe...
Smartphones are the most popular personal electronic devices. They are used for all sorts of purpose...
Privacy and security tools and strategies are not equally effective for everyone---many high-risk co...