Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The paper provides an overview of behaviour considered to be risky, explaining potential threats users may face online. Existing tools developed to reduce risky security behaviours in end-users have been compared, discussing the success rates of various methodologies. Ongoing research is described which attempts to educate users regarding the risks and consequences of poor security behaviour by providing the appropriate feedback on the automatic recognition of risky behaviour. The pape...
Cyber attacks are emerging as problems caused not only by tech- nological aspects but also by human ...
With the wide spread use of Internet, comes an increase in Information Security threats. To protect ...
Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What i...
Despite the number of tools created to help end-users reduce risky security behaviours, users are st...
Abstract—Web browser security is lacking and browsers are often unable to detect what is unwanted tr...
Part 1: WISE 8International audienceA call for adopting information security awareness amongst end-u...
Most studies in usable security research aim at a quantification of persons, who – depending on the...
Key aspects that weaken users’ ability to use security are often related to the difficulty of compre...
We conducted an online experiment (n=2,024) on a representative sample of internet users in Germany,...
We conducted an online experiment (n=2,024) on a representative sample of internet users in Germany,...
There has been a general consensus in the computer security research community that the usability of...
Cyber attacks are emerging as problems caused not only by technological aspects but also by human fa...
Security warnings seem to be a predominant way to bridge the gap of providing rich, but potentially ...
Eavesdropping on passwords sent over insecure connections still poses a significant threat to Web us...
New and nontraditional approaches are required to effectively tackle the global problem of cybercrim...
Cyber attacks are emerging as problems caused not only by tech- nological aspects but also by human ...
With the wide spread use of Internet, comes an increase in Information Security threats. To protect ...
Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What i...
Despite the number of tools created to help end-users reduce risky security behaviours, users are st...
Abstract—Web browser security is lacking and browsers are often unable to detect what is unwanted tr...
Part 1: WISE 8International audienceA call for adopting information security awareness amongst end-u...
Most studies in usable security research aim at a quantification of persons, who – depending on the...
Key aspects that weaken users’ ability to use security are often related to the difficulty of compre...
We conducted an online experiment (n=2,024) on a representative sample of internet users in Germany,...
We conducted an online experiment (n=2,024) on a representative sample of internet users in Germany,...
There has been a general consensus in the computer security research community that the usability of...
Cyber attacks are emerging as problems caused not only by technological aspects but also by human fa...
Security warnings seem to be a predominant way to bridge the gap of providing rich, but potentially ...
Eavesdropping on passwords sent over insecure connections still poses a significant threat to Web us...
New and nontraditional approaches are required to effectively tackle the global problem of cybercrim...
Cyber attacks are emerging as problems caused not only by tech- nological aspects but also by human ...
With the wide spread use of Internet, comes an increase in Information Security threats. To protect ...
Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What i...