2022
DOI: 10.1080/0144929x.2022.2080908
|View full text |Cite
|
Sign up to set email alerts
|

A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 75 publications
0
5
0
Order By: Relevance
“…Other scholars attempted to review this field of study in academic journal articles. However, many of these contributions lack a systematic approach (e.g., 5,7,8). Accordingly, they do not express the inclusion and exclusion criteria, and the selection of articles is based on the authors' narrative choice.…”
Section: Rationalementioning
confidence: 99%
See 1 more Smart Citation
“…Other scholars attempted to review this field of study in academic journal articles. However, many of these contributions lack a systematic approach (e.g., 5,7,8). Accordingly, they do not express the inclusion and exclusion criteria, and the selection of articles is based on the authors' narrative choice.…”
Section: Rationalementioning
confidence: 99%
“…In recent years, many research groups and agencies have addressed the balance between security and usability, particularly after the increase in Internet use (including smart working and e-commerce) stemming from the COVID-19 pandemic and a related significant increase in cyberattacks [5][6][7][8][9][10]. Contributions to this area are variegated.…”
Section: Introductionmentioning
confidence: 99%
“…Cybersecurity is a concern for all organizations. Much has been written about technical solutions and how to incent end-users to adopt strong security practices (Reuter et al , 2022; Hirschprung et al , 2020), developers and software engineers security practices (Naiakshina, 2019; Ploger et al , 2021), and or external penetration (Lee, 2021; Alzaqebah et al , 2023), but minimally regarding the impact of fatigue in cybersecurity response (Chen et al , 2022). Organizations have devoted their resources to address cybersecurity issues focus on endpoints and networks (Hansen, 2022) are limited to partial solutions (Pharris and Perez-Mira, 2022) or educating the end-user (Chowdhury et al , 2019; Chowdhury et al , 2022), but have overlooked a core component of the organization and its systems, the ERP.…”
Section: Introductionmentioning
confidence: 99%
“…To apply the vendor-generated patches in the enterprise the focus is different. In the enterprise, the focus is on end-users or end-points (Reuter et al , 2022; Hirschprung et al , 2020; Naiakshina, 2019; Ploger et al , 2021), but the patches are left to a myriad of different parts of the organizations to apply (Meyer and Lambert, 2007; Clarke, 2023). In many cases the user organization or the ERP Manager may not responsible for patch application, but not integral to cybersecurity management (Defossez and Arpino, 2022), creating conflicting objectives within the enterprise.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation