Awareness and Working Knowledge of Secure Design Principles: A User Study
|
2020 |
Almousa, May |
Analyzing Cybersecurity Understanding Using a Brain Computer Interface
|
2020 |
Capellan, Kingberli |
Security Matters ... Until Something Else Matters More: Security Notifications on Different Form Factors
|
2020 |
Molyneaux, Heather |
The Man in the Besieged Castle: Heuristic Evaluation of Home Security Systems
|
2020 |
Sánchez-Adame, Luis Martín |
"Alexa, Are You Spying on Me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users
|
2020 |
Chalhoub, George |
Analysis of Factors Improving Accuracy of Passive User Identification with Streams of Face Images for Ubiquitous Commerce
|
2020 |
Wojtowicz, Adam |
Multi-method Approach Measuring Trust, Distrust, and Suspicion in Information Technology
|
2020 |
Jessup, Sarah A. |
Did I Agree to This? Silent Tracking Through Beacons
|
2020 |
Kashi, Edden |
Parents Unwittingly Leak Their Children's Data: A GDPR Time Bomb?
|
2020 |
Prior, Suzanne |
An Emerging Strategy for Privacy Preserving Databases: Differential Privacy
|
2020 |
Rashid, Fatema |
Personal Data Discoverability to Human Searchers: Observations on Personal Data Availability
|
2020 |
Richards, Kirsten E. |
Evaluation of Secure Pad Resilient to Shoulder Hacking
|
2020 |
Kobayashi, Kokoro |
An Improved Method of Time-Frequency Joint Analysis of Mouse Behavior for Website User Trustworthy Authentication
|
2020 |
Li, Wei |
Smart Assistants in IT Security — An Approach to Addressing the Challenge by Leveraging Assistants’ Specific Features
|
2020 |
Kubach, Michael |
Predicting Tap Locations on Touch Screens in the Field Using Accelerometer and Gyroscope Sensor Readings
|
2020 |
Schmitt, Emanuel |
Private Cloud Storage: Client-Side Encryption and Usable Secure Utility Functions
|
2020 |
Tachikawa, Akihiro |
Does Decision-Making Style Predict Individuals Cybersecurity Avoidance Behaviour?
|
2020 |
Algahtani, Hamed |
Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour
|
2020 |
Coventry, Lynne |
Another Week at the Office (AWATO) — An Interactive Serious Game for Threat Modeling Human Factors
|
2020 |
Ferro, Lauren S. |
Not Annoying the User for Better Password Choice: Effect of Incidental Anger Emotion on Password Choice
|
2020 |
Khan, Laheem |