Academic literature on the topic 'Usable security and privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Usable security and privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Usable security and privacy"

1

Fischer-Hübner, Simone, Luigi Lo Iacono, and Sebastian Möller. "Usable Security und Privacy." Datenschutz und Datensicherheit - DuD 34, no. 11 (November 2010): 773–82. http://dx.doi.org/10.1007/s11623-010-0210-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alt, Florian, and Emanuel von Zezschwitz. "Emerging Trends in Usable Security and Privacy." i-com 18, no. 3 (November 18, 2019): 189–95. http://dx.doi.org/10.1515/icom-2019-0019.

Full text
Abstract:
AbstractNew technologies are constantly becoming part of our everyday life. At the same time, designers and developers still often do not consider the implications of their design choices on security and privacy. For example, new technologies generate sensitive data, enable access to sensitive data, or can be used in malicious ways. This creates a need to fundamentally rethink the way in which we design new technologies. While some of the related opportunities and challenges have been recognized and are being addressed by the community, there is still a need for a more holistic understanding. In this editorial, we will address this by (1) providing a brief historical overview on the research field of ‘Usable Security and Privacy’; (2) deriving a number of current and future trends; and (3) briefly introducing the articles that are part of this special issue and describing how they relate to the current trends and what researchers and practitioners can learn from them.
APA, Harvard, Vancouver, ISO, and other styles
3

Chiasson, Sonia, Heather Crawford, Serge Egelman, and Pourang Irani. "Reflections on U-PriSM 2." International Journal of Mobile Human Computer Interaction 6, no. 2 (April 2014): 73–78. http://dx.doi.org/10.4018/ijmhci.2014040106.

Full text
Abstract:
The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI'13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or even novice users, regularly making important decisions while their main focus is on other primary tasks. This is especially true for mobile devices where users can quickly and easily install apps, where user interfaces are minimal due to space constraints, and where users are often distracted by their environment. Likewise, mobile devices present unique privacy and security risks because they allow third-party applications access to personal information and sensor data. The amount and sensitivity of such personally identifying information is likely to increase as device functionality increases. The convergence of these factors means that improvements to security and privacy provisions on mobile devices are becoming increasingly important. Workshop participants had a chance to explore mobile device usage and the unique usable security and privacy challenges that arise, discuss proposed systems and ideas that address these needs, and work towards the development of design principles to inform future development in the area.
APA, Harvard, Vancouver, ISO, and other styles
4

Alemerien, Khalid. "Usable Security and Privacy on Online Social Networks." International Journal of Software Innovation 9, no. 2 (April 2021): 35–68. http://dx.doi.org/10.4018/ijsi.2021040103.

Full text
Abstract:
Hundreds of millions of people use online social networks (OSNs), and this use is growing rapidly. On the one hand, users of OSNs have created accounts, which include their personal information, interests, associations, postings, daily activities, sharing of social media, and so forth. In addition, users want to protect these information and activities. But on the other hand, they want to use the services, which are provided by OSNs in order to stay in touch with others. Therefore, for achieving this desire, users reveal their personal information intentionally or accidentally. Why? Because users of OSNs do not have adequate information that helps them in making security and privacy decisions effectively in addition to inadequate feedback about the implications of user decisions. This means users do not know what to reveal and how. In order to cope with this problem, a systematic literature review of the usable security and privacy on OSNs was performed. This review is an attempt to pursue the contours of research in OSNs. Therefore, this paper discusses the existing research work, highlights the main research challenges and existing solutions, identifies open research issues, and proposes some directions for future research in the usable security and privacy on OSNs.
APA, Harvard, Vancouver, ISO, and other styles
5

Karat, Clare-Marie, Carolyn Brodie, and John Karat. "Usable privacy and security for personal information management." Communications of the ACM 49, no. 1 (January 2006): 56–57. http://dx.doi.org/10.1145/1107458.1107491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shay, Rich. "CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)." XRDS: Crossroads, The ACM Magazine for Students 20, no. 1 (September 2013): 62–63. http://dx.doi.org/10.1145/2508976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Faraz, Syed Hassan, Syed Hassan Tanvir, and Saqib Saeed. "A Study on Privacy and Security Aspects of Facebook." International Journal of Technology Diffusion 3, no. 4 (October 2012): 48–55. http://dx.doi.org/10.4018/jtd.2012100105.

Full text
Abstract:
Social web has changed the concept of leisure time. As a result street neighbors have been replaced by e-neighbors and walls have become e-walls to share ideas and gossips. Despite so many advantages we cannot ignore potential threats to user privacy and security. In order to be extremely usable, such systems should have strict security and privacy policies in place. In this paper the authors focus on “Facebook” to understand privacy and security problems by carrying out a web based survey. Based on the findings from empirical data the authors propose different enhancements for the improvement of user privacy and potential threats to user account security.
APA, Harvard, Vancouver, ISO, and other styles
8

Papoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (February 4, 2021): 1396. http://dx.doi.org/10.3390/app11041396.

Full text
Abstract:
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building blocks to architectures, can be an asset in alleviating said barrier. More specifically, patterns can be used to encode dependencies between SP properties of individual smart objects and corresponding properties of orchestrations (compositions) involving them, facilitating the design of IoT solutions that are secure and privacy-aware by design. Motivated by the above, this work presents a survey and taxonomy of SP patterns towards the creation of a usable pattern collection. The aim is to enable decomposition of higher-level properties to more specific ones, matching them to relevant patterns, while also creating a comprehensive overview of security- and privacy-related properties and sub-properties that are of interest in IoT/IIoT environments. To this end, the identified patterns are organized using a hierarchical taxonomy that allows their classification based on provided property, context, and generality, while also showing the relationships between them. The two high-level properties, Security and Privacy, are decomposed to a first layer of lower-level sub-properties such as confidentiality and anonymity. The lower layers of the taxonomy, then, include implementation-level enablers. The coverage that these patterns offer in terms of the considered properties, data states (data in transit, at rest, and in process), and platform connectivity cases (within the same IoT platform and across different IoT platforms) is also highlighted. Furthermore, pointers to extensions of the pattern collection to include additional patterns and properties, including Dependability and Interoperability, are given. Finally, to showcase the use of the presented pattern collection, a practical application is detailed, involving the pattern-driven composition of IoT/IIoT orchestrations with SP property guarantees.
APA, Harvard, Vancouver, ISO, and other styles
9

Distler, Verena, Matthias Fassl, Hana Habib, Katharina Krombholz, Gabriele Lenzini, Carine Lallemand, Lorrie Faith Cranor, and Vincent Koenig. "A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research." ACM Transactions on Computer-Human Interaction 28, no. 6 (December 31, 2021): 1–50. http://dx.doi.org/10.1145/3469845.

Full text
Abstract:
Usable privacy and security researchers have developed a variety of approaches to represent risk to research participants. To understand how these approaches are used and when each might be most appropriate, we conducted a systematic literature review of methods used in security and privacy studies with human participants. From a sample of 633 papers published at five top conferences between 2014 and 2018 that included keywords related to both security/privacy and usability, we systematically selected and analyzed 284 full-length papers that included human subjects studies. Our analysis focused on study methods; risk representation; the use of prototypes, scenarios, and educational intervention; the use of deception to simulate risk; and types of participants. We discuss benefits and shortcomings of the methods, and identify key methodological, ethical, and research challenges when representing and assessing security and privacy risk. We also provide guidelines for the reporting of user studies in security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
10

Das, Sauvik. "Computer scientists in action: Sauvik Das, usable security & privacy." XRDS: Crossroads, The ACM Magazine for Students 25, no. 1 (October 2018): 61–62. http://dx.doi.org/10.1145/3265929.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Usable security and privacy"

1

Vaziripour, Elham. "Usable Security and Privacy for Secure Messaging Applications." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/8830.

Full text
Abstract:
The threat of government and corporate surveillance around the world, as well as the publicity surrounding major cybersecurity attacks, have increased interest in secure and private end-to-end communications. In response to this demand, numerous secure messaging applications have been developed in recent years. These applications have been welcomed and publically used not just by political activists and journalists but by everyday users as well. Most of these popular secure messaging applications are usable because they hide many of the details of how encryption is provided. The strength of the security properties of these applications relies on the authentication ceremony, wherein users validate the keys being used for encryption that is exchanged through the service providers. The validation process typically involves verifying the fingerprints of encryption keys to protect the communication from being intercepted.In this dissertation, we explore how to help users enhance the privacy of their communica- tions, with a particular focus on secure messaging applications. First, we explore whether secure messaging applications are meeting the security and privacy needs of their users, especially in countries that practice censorship and restrict civil liberties, including blocking access to social media and communication applications. Second, we studied existing popular secure messaging applications to explore how users interact with these applications and how well they are using the authentication ceremony during lab studies. Third, we applied design principles to improve the interfaces for the authentication ceremony, and also to help users find and perform the authentication ceremony faster. Forth, we applied the lessons from our interviews with participants in our user studies to help users comprehend the importance of authentication. As part of the effort, we developed an authentication ceremony using social media accounts to map key fingerprints to social features, pushing the ceremony to a more natural domain for users. We modified the Signal secure messaging application to include this social authentication ceremony and used a user study to compare this method to other common methods. We found that social authentication has some promising features, but that social media companies are too distrusted by users. Based on our results, we make several recommendations to improve the use of security and privacy features in secure messaging applications and outline areas for future work.
APA, Harvard, Vancouver, ISO, and other styles
2

Vega, Laurian. "Security in Practice: Examining the Collaborative Management of Sensitive Information in Childcare Centers and Physicians' Offices." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37552.

Full text
Abstract:
Traditionally, security has been conceptualized as rules, locks, and passwords. More recently, security research has explored how people interact in secure (or insecure) ways in part of a larger socio-technical system. Socio-technical systems are comprised of people, technology, relationships, and interactions that work together to create safe praxis. Because information systems are not just technical, but also social, the scope of privacy and security concerns must include social and technical factors. Clearly, computer security is enhanced by developments in the technical arena, where researchers are building ever more secure and robust systems to guard the privacy and confidentiality of information. However, when the definition of security is broadened to encompass both human and technical mechanisms, how security is managed with and through the day-to-day social work practices becomes increasingly important. In this dissertation I focus on how sensitive information is collaboratively managed in socio-technical systems by examining two domains: childcare centers and physiciansâ offices. In childcare centers, workers manage the enrolled children and also the enrolled childâ s personal information. In physiciansâ offices, workers manage the patientsâ health along with the patientsâ health information. My dissertation presents results from interviews and observations of these locations. The data collected consists of observation notes, interview transcriptions, pictures, and forms. The researchers identified breakdowns related to security and privacy. Using Activity Theory to first structure, categorize, and analyze the observed breakdowns, I used phenomenological methods to understand the context and experience of security and privacy. The outcomes from this work are three themes, along with corresponding future scenarios. The themes discussed are security embodiment, communities of security, and zones of ambiguity. Those themes extend the literature in the areas of usable security, human-computer interaction, and trust. The presentation will use future scenarios to examine the complexity of developing secure systems for the real world.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
3

Angulo, Julio. "Usable privacy for digital transactions : Exploring the usability aspects of three privacy enhancing mechanisms." Licentiate thesis, Karlstads universitet, Avdelningen för informatik och projektledning, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-14832.

Full text
Abstract:
The amount of personal identifiable information that people distribute over different online services has grown rapidly and considerably over the last decades. This has led to increased probabilities for identity theft, profiling and linkability attacks, which can in turn not only result in a threat to people’s personal dignity, finances, and many other aspects of their lives, but also to societies in general. Methods and tools for securing people’s online activities and protecting their privacy on the Internet, so called Privacy Enhancing Technologies (PETs), are being designed and developed. However, these technologies are often seen by ordinary users as complicated and disruptive of their primary tasks.   In this licentiate thesis, I investigate the usability aspects of three main privacy and security enhancing mechanisms. These mechanisms have the goal of helping and encouraging users to protect their privacy on the Internet as they engage in some of the steps necessary to complete a digital transaction. The three mechanisms, which have been investigated within the scope of different research projects, comprise of (1) graphical visualizations of service providers’ privacy policies and user-friendly management and matching of users’ privacy preferences “on the fly”, (2) methods for helping users create appropriate mental models of the data minimization property of anonymous credentials, and (3) employing touch-screen biometrics as a method to authenticate users into mobile devices and verify their identities during a digital transaction.   Results from these investigations suggest that these mechanisms can make digital transactions privacy-friendly and secure while at the same time delivering convenience and usability for ordinary users.
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Justin Chun Wah. "Resolving the Privacy Paradox: Bridging the Behavioral Intention Gap with Risk Communication Theory." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8702.

Full text
Abstract:
The advent of the Internet has led to vastly increased levels of data accessibility to both users and would-be attackers. The privacy paradox is an established phenomenon wherein users express concern about resultant security and privacy threats to their data, but nevertheless fail to enact the host of protective measures that have steadily become available. The precise nature of this phenomenon, however, is not a settled matter. Fortunately, risk communication theory, a discipline devoted to understanding the factors involved in risk-oriented decision-making and founded in years of empirical research in public health and disaster awareness domains, presents an opportunity to seek greater insight into this problem. In this dissertation, we explore the application of principles and techniques from risk communication theory to the question of factors in the grassroots adoption of secure communication technologies. First, we apply a fundamental first-step technique in risk communication—mental modeling—toward understanding users' perceptions of the structure, function, and utility of encryption in day-to-day life. Second, we apply principles of risk communication to system design by redesigning the authentication ceremony and its associated messaging in the Signal secure messaging application. Third, we evaluate the applicability of a core decision-making theory—protection motivation theory—toward the problem of secure email adoption, and then use this framework to describe the relative impact of various factors on secure email adoption. Finally, we evaluate perceptions of risk and response with respect to the adoption of secure email features in email scenarios of varying sensitivity levels. Our work identifies positive outcomes with respect to the impact that risk messaging has on feature adoption, and mixed results with respect to comprehension. We highlight obstacles to users' mental interactions with encryption, but offer recommendations for progress in the adoption of encryption. We further demonstrate that protection motivation theory, a core behavioral theory underlying many risk communication approaches, has the ability to explain the factors involved in users' decisions to adopt or not adopt in a way that can at least partially explain the privacy paradox phenomenon. In general, we find that the application of even basic principles and techniques from risk communication theory do indeed produce favorable research outcomes when applied to this domain.
APA, Harvard, Vancouver, ISO, and other styles
5

Das, Sauvik. "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/982.

Full text
Abstract:
Despite substantial effort made by the usable security community at facilitating the use of recommended security systems and behaviors, much security advice is ignored and many security systems are underutilized. I argue that this disconnect can partially be explained by the fact that security behaviors have myriad unaccounted for social consequences. For example, by using two-factor authentication, one might be perceived as “paranoid”. By encrypting an e-mail correspondence, one might be perceived as having something to hide. Yet, to date, little theoretical work in usable security has applied theory from social psychology to understand how these social consequences affect people’s security behaviors. Likewise, little systems work in usable security has taken social factors into consideration. To bridge these gaps in literature and practice, I begin to build a theory of social cybersecurity and apply those theoretical insights to create systems that encourage better cybersecurity behaviors. First, through a series of interviews, surveys and a large-scale analysis of how security tools diffuse through the social networks of 1.5 million Facebook users, I empirically model how social influences affect the adoption of security behaviors and systems. In so doing, I provide some of the first direct evidence that security behaviors are strongly driven by social influence, and that the design of a security system strongly influences its potential for social spread. Specifically, security systems that are more observable, inclusive, and stewarded are positively affected by social influence, while those that are not are negatively affected by social influence. Based on these empirical results, I put forth two prescriptions: (i) creating socially grounded interface “nudges” that encourage better cybersecurity behaviors, and (ii) designing new, more socially intelligent end-user facing security systems. As an example of a social “nudge”, I designed a notification that informs Facebook users that their friends use optional security systems to protect their own accounts. In an experimental evaluation with 50,000 Facebook users, I found that this social notification was significantly more effective than a non-social control notification at attracting clicks to improve account security and in motivating the adoption of promoted, optional security tools. As an example of a socially intelligent cybersecurity system, I designed Thumprint: an inclusive authentication system that authenticates and identifies individual group members of a small, local group through a single, shared secret knock. Through my evaluations, I found that Thumprint is resilient to casual but motivated adversaries and that it can reliably differentiate multiple group members who share the same secret knock. Taken together, these systems point towards a future of socially intelligent cybersecurity that encourages better security behaviors. I conclude with a set of descriptive and prescriptive takeaways, as well as a set of open problems for future work. Concretely, this thesis provides the following contributions: (i) an initial theory of social cybersecurity, developed from both observational and experimental work, that explains how social influences affect security behaviors; (ii) a set of design recommendations for creating socially intelligent security systems that encourage better cybersecurity behaviors; (iii) the design, implementation and comprehensive evaluation of two such systems that leverage these design recommendations; and (iv) a reflection on how the insights uncovered in this work can be utilized alongside broader design considerations in HCI, security and design to create an infrastructure of useful, usable and socially intelligent cybersecurity systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Grunwell, Daniel K. "Designing and implementing an information accountability framework for usable and useful eHealth systems." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/103323/1/Daniel%20Grunwell%20Thesis.pdf.

Full text
Abstract:
This research examined the design and implementation of an Information Accountability Framework for eHealth with the aim of enabling the creation of more useful eHealth systems. The study explored the challenges of implementing the accountability mechanisms as a means to balance patient privacy concerns and the information access needs of healthcare professionals. Through the use of modelling, user studies, and case studies, the thesis presented an architecture and requirements for implementing the protocols, proposed an extended model of the framework, and provided concrete examples of modifying existing eHealth systems to include the protocols.
APA, Harvard, Vancouver, ISO, and other styles
7

Gamagedara, Arachchilage Nalin Asanka. "Security awareness of computer users : a game based learning approach." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/7620.

Full text
Abstract:
The research reported in this thesis focuses on developing a framework for game design to protect computer users against phishing attacks. A comprehensive literature review was conducted to understand the research domain, support the proposed research work and identify the research gap to fulfil the contribution to knowledge. Two studies and one theoretical design were carried out to achieve the aim of this research reported in this thesis. A quantitative approach was used in the first study while engaging both quantitative and qualitative approaches in the second study. The first study reported in this thesis was focused to investigate the key elements that should be addressed in the game design framework to avoid phishing attacks. The proposed game design framework was aimed to enhance the user avoidance behaviour through motivation to thwart phishing attack. The results of this study revealed that perceived threat, safeguard effectiveness, safeguard cost, self-efficacy, perceived severity and perceived susceptibility elements should be incorporated into the game design framework for computer users to avoid phishing attacks through their motivation. The theoretical design approach was focused on designing a mobile game to educate computer users against phishing attacks. The elements of the framework were addressed in the mobile game design context. The main objective of the proposed mobile game design was to teach users how to identify phishing website addresses (URLs), which is one of many ways of identifying a phishing attack. The mobile game prototype was developed using MIT App inventor emulator. In the second study, the formulated game design framework was evaluated through the deployed mobile game prototype on a HTC One X touch screen smart phone. Then a discussion is reported in this thesis investigating the effectiveness of the developed mobile game prototype compared to traditional online learning to thwart phishing threats. Finally, the research reported in this thesis found that the mobile game is somewhat effective in enhancing the user’s phishing awareness. It also revealed that the participants who played the mobile game were better able to identify fraudulent websites compared to the participants who read the website without any training. Therefore, the research reported in this thesis determined that perceived threat, safeguard effectiveness, safeguard cost, self-efficacy, perceived threat and perceived susceptibility elements have a significant impact on avoidance behaviour through motivation to thwart phishing attacks as addressed in the game design framework.
APA, Harvard, Vancouver, ISO, and other styles
8

Galanská, Katarína. "Relevance pokynů pro použitelnou bezpečnost z pohledu IT profesionála." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445558.

Full text
Abstract:
Vyvážení bezpečnosti a použitelnosti bylo vždy výzvou. Navzdory důležitosti zabezpečení softwaru jsou bezpečnostní pokyny a standardy často příliš komplikované, náchylné k chybám nebo časově náročné. Tato nerovnováha iniciovala vznik pojmu použitelné bezpečnosti. Po celá léta to byl běžný výzkumný problém. Zatímco softvér by měl být vyvíjen s ohledem na použitelnost koncových uživatelů, bezpečnostním standardům a směrnicím, které používají IT profesionálové, není z hlediska použitelnosti často věnována dostatečná pozornost. Vzhledem k tomu, že se od odborníků v oblasti IT očekává vyšší úroveň znalostí, často čelí velmi složitým oblastem, když se snaží vyhovět konkrétním bezpečnostním standardům nebo dodržovat konkrétní pokyny. Tato práce představuje studium současného povědomí v oblasti použitelné bezpečnosti. Práce sestává z provedeného průzkumu, analýzy stávajících použitelných bezpečnostních pokynů a navrhuje vzdělávací pomůcku k řešení problémů, které výzkum přinesl. Hodnocení vzdělávací pomůcky ukázalo pozitivní dopad na povědomí IT odborníků.
APA, Harvard, Vancouver, ISO, and other styles
9

Rahman, Md Mizanur. "Search Rank Fraud Prevention in Online Systems." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3909.

Full text
Abstract:
The survival of products in online services such as Google Play, Yelp, Facebook and Amazon, is contingent on their search rank. This, along with the social impact of such services, has also turned them into a lucrative medium for fraudulently influencing public opinion. Motivated by the need to aggressively promote products, communities that specialize in social network fraud (e.g., fake opinions and reviews, likes, followers, app installs) have emerged, to create a black market for fraudulent search optimization. Fraudulent product developers exploit these communities to hire teams of workers willing and able to commit fraud collectively, emulating realistic, spontaneous activities from unrelated people. We call this behavior “search rank fraud”. In this dissertation, we argue that fraud needs to be proactively discouraged and prevented, instead of only reactively detected and filtered. We introduce two novel approaches to discourage search rank fraud in online systems. First, we detect fraud in real-time, when it is posted, and impose resource consuming penalties on the devices that post activities. We introduce and leverage several novel concepts that include (i) stateless, verifiable computational puzzles that impose minimal performance overhead, but enable the efficient verification of their authenticity, (ii) a real-time, graph based solution to assign fraud scores to user activities, and (iii) mechanisms to dynamically adjust puzzle difficulty levels based on fraud scores and the computational capabilities of devices. In a second approach, we introduce the problem of fraud de-anonymization: reveal the crowdsourcing site accounts of the people who post large amounts of fraud, thus their bank accounts, and provide compelling evidence of fraud to the users of products that they promote. We investigate the ability of our solutions to ensure that fraud does not pay off.
APA, Harvard, Vancouver, ISO, and other styles
10

Sunkaralakunta, Venkatarama Reddy Rakesh. "A User-Centric Security Policy Enforcement Framework for Hybrid Mobile Applications." University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1564744609523447.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Usable security and privacy"

1

Abraham, Ajith. Computational Social Networks: Security and Privacy. London: Springer London, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Garfinkel, Simson, and Heather Richter Lipford. Usable Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-02343-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Analyzing and securing social networks. Boca Raton: Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stănică, Pantelimon, Sugata Gangopadhyay, and Sumit Kumar Debnath, eds. Security and Privacy. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6781-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stănică, Pantelimon, Sihem Mesnager, and Sumit Kumar Debnath, eds. Security and Privacy. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90553-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nandi, Sukumar, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, and Parvez Faruki, eds. Security and Privacy. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7561-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stalla-Bourdillon, Sophie, Joshua Phillips, and Mark D. Ryan. Privacy vs. Security. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Institute, Pennsylvania Bar. Privacy and security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mather, Tim. Cloud security and privacy. Beijing: O'Reilly, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kierkegaard, Sylvia Mercado. Cyberlaw, security and privacy. Ankara, Turkey: Ankara Bar Association Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Usable security and privacy"

1

Christin, Delphine, Franziska Engelmann, and Matthias Hollick. "Usable Privacy for Mobile Sensing Applications." In Information Security Theory and Practice. Securing the Internet of Things, 92–107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43826-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Naqvi, Bilal, and Jari Porras. "Usable Security by Design: A Pattern Approach." In HCI for Cybersecurity, Privacy and Trust, 609–18. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Torres, Christof Ferreira, Hugo Jonker, and Sjouke Mauw. "FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting." In Computer Security -- ESORICS 2015, 3–19. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24177-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Carrión, Inma, Jose L. Fernández-Alemán, and Ambrosio Toval. "Usable Privacy and Security in Personal Health Records." In Human-Computer Interaction – INTERACT 2011, 36–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23768-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Seamons, Kent. "Privacy-Enhancing Technologies." In Modern Socio-Technical Perspectives on Privacy, 149–70. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82786-1_8.

Full text
Abstract:
AbstractAn increasing amount of sensitive information is being communicated and stored online. Frequent reports of data breaches and sensitive data disclosures underscore the need for effective technologies that users and administrators can deploy to protect sensitive data. Privacy-enhancing technologies can control access to sensitive information to prevent or limit privacy violations. This chapter focuses on some of the technologies that prevent unauthorized access to sensitive information. These technologies include secure messaging, secure email, HTTPS, two-factor authentication, and anonymous communication. Usability is an essential component of a security evaluation because human error or unwarranted inconvenience can render the strongest security guarantees meaningless. Quantitative and qualitative studies from the usable security research community evaluate privacy-enhancing technologies from a socio-technical viewpoint and provide insights for future efforts to design and develop practical techniques to safeguard privacy. This chapter discusses the primary privacy-enhancing technologies that the usable security research community has analyzed and identifies issues, recommendations, and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
6

Hochleitner, Christina, Cornelia Graf, Peter Wolkerstorfer, and Manfred Tscheligi. "uTRUSTit – Usable Trust in the Internet of Things." In Trust, Privacy and Security in Digital Business, 220–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32287-7_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Karat, Clare-Marie, and John Karat. "Case Study 3: Security and Privacy Policy Management Technologies." In Designing and Evaluating Usable Technology in Industrial Research, 57–79. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-02190-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Belk, Marios, Christos Fidas, Panagiotis Germanakos, and George Samaras. "On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security." In Lecture Notes in Computer Science, 3–10. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07620-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Franz, Elke, and Katja Liesebach. "Supporting Local Aliases as Usable Presentation of Secure Pseudonyms." In Trust, Privacy and Security in Digital Business, 22–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03748-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Feth, Denis, Andreas Maier, and Svenja Polst. "A User-Centered Model for Usable Security and Privacy." In Human Aspects of Information Security, Privacy and Trust, 74–89. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Usable security and privacy"

1

Paturi, Anand, Patrick Kelley, and Subhasish Mazumdar. "Introducing Privacy Threats from Ad Libraries to Android Users Through Privacy Granules." In Workshop on Usable Security. Reston, VA: Internet Society, 2015. http://dx.doi.org/10.14722/usec.2015.23008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Poikela, Maija, and Sebastian Mšller. "The Role of Privacy Violations in Privacy Calculus." In European Workshop on Usable Security. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/eurousec.2018.23015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krombholz, Katharina, Adrian Dabrowski, Matthew Smith, and Edgar Weippl. "Exploring Design Directions for Wearable Privacy." In Workshop on Usable Security. Reston, VA: Internet Society, 2017. http://dx.doi.org/10.14722/usec.2017.23001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Minkus, Tehila, and Nasir Memon. "On a Scale from 1 to 10, How Private Are You? Scoring Facebook Privacy Settings." In Workshop on Usable Security. Reston, VA: Internet Society, 2014. http://dx.doi.org/10.14722/usec.2014.23013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rashidi, Yasmeen, Kami Vaniea, and L. Jean Camp. "Understanding Saudis' Privacy Concerns When Using WhatsApp." In Workshop on Usable Security. Reston, VA: Internet Society, 2016. http://dx.doi.org/10.14722/usec.2016.23022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brodie, Carolyn, Clare-Marie Karat, John Karat, and Jinjuan Feng. "Usable security and privacy." In the 2005 symposium. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1073001.1073005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar Murukannaiah, Pradeep, Jessica Staddon, Heather Lipford, and Bart Knijnenburg. "(Work in Progress) Is this a privacy incident? Using News Exemplars to Study End User Perceptions of Privacy Incidents." In Workshop on Usable Security. Reston, VA: Internet Society, 2017. http://dx.doi.org/10.14722/usec.2017.23030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kulyk, Oksana, Paul Gerber, Karola Marky, Christopher Beckmann, and Melanie Volkamer. "Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users." In Workshop on Usable Security. Reston, VA: Internet Society, 2019. http://dx.doi.org/10.14722/usec.2019.23029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Raber, Frederic, David Ziemann, and Antonio Krueger. "The 'Retailio' Privacy Wizard: Assisting Users with Privacy Settings for Intelligent Retail Stores." In European Workshop on Usable Security. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/eurousec.2018.23001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alqhatani, Abdulmajeed, and Heather Lipford. "Exploring Parents’ Security and Privacy Concerns and Practices." In Workshop on Usable Security. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/usec.2018.23019.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Usable security and privacy"

1

Weinberger, P., C. Callan, W. Dally, A. Peterson, and W. Press. Security and Privacy in the NII,. Fort Belvoir, VA: Defense Technical Information Center, February 1995. http://dx.doi.org/10.21236/ada293475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Elkins, M. MIME Security with Pretty Good Privacy (PGP). RFC Editor, October 1996. http://dx.doi.org/10.17487/rfc2015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, S. W., and J. D. Tygar. Security and Privacy for Partial Order Time. Fort Belvoir, VA: Defense Technical Information Center, April 1994. http://dx.doi.org/10.21236/ada278953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cooper, A., F. Gont, and D. Thaler. Security and Privacy Considerations for IPv6 Address Generation Mechanisms. RFC Editor, March 2016. http://dx.doi.org/10.17487/rfc7721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gilbert, Dennis M. 1989 Computer Security and Privacy Plans (CSSP) review project:. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jansen, W., and T. Grance. Guidelines on security and privacy in public cloud computing. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Haney, Julie M., Susanne M. Furman, and Yasemin Acar. Research Report: User Perceptions of Smart Home Privacy and Security. National Institute of Standards and Technology, November 2020. http://dx.doi.org/10.6028/nist.ir.8330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Huitema, C., and D. Kaiser. DNS-Based Service Discovery (DNS-SD) Privacy and Security Requirements. RFC Editor, September 2020. http://dx.doi.org/10.17487/rfc8882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mehta, Ketan. Security and Privacy Considerations for Implementing Mobile Driving License (mDL). Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fainman, Y. Quantum and Classical Cryptography for Security and Privacy of Photonic Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada388577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography