2017
DOI: 10.1016/j.procs.2017.12.198
|View full text |Cite
|
Sign up to set email alerts
|

Usable Security: Revealing End-Users Comprehensions on Security Warnings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…The use of security warnings to alert users about events that occur on their computer, that could compromise their security and privacy, was researched in [14][15][16]. In [15] the authors suggest that users tend to ignore security warnings due to a lack of attention, understanding or motivation. A survey was used to gain understanding of user perception and understanding towards security warnings.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of security warnings to alert users about events that occur on their computer, that could compromise their security and privacy, was researched in [14][15][16]. In [15] the authors suggest that users tend to ignore security warnings due to a lack of attention, understanding or motivation. A survey was used to gain understanding of user perception and understanding towards security warnings.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The author undertook a study to establish the views of NEUs on personal cyber security and suggests a lack of technical knowledge and ability to explore network communication, results in little or no awareness of security issues. To test this statement, we derive a null and alternate hypothesis as follows: Previous studies such as [15] have demonstrated relationships between the technical ability of a user, and the ability to be perceive and be aware of risks. To our knowledge, this paper presents the first study to assess the ability of users to perceive and detect threats (botnets) facing the IoT.…”
Section: Situational Awareness Of Threats Facing the Iotmentioning
confidence: 99%
“…The calculation of the probability for an attack to succeed as Proba attackSucceed established in (20), The probability's calculation that the defensive measure succeed Proba def enseSucceed established in (23), Losses related to each player respectively established in (24) and (25).…”
Section: They Includementioning
confidence: 99%
“…A script 14 in Matlab has been written to determine utility functions of players for a not repeated game and simulates Equation (20).…”
Section: Simulations and Interpretations In Case Of An Attackmentioning
confidence: 99%
See 1 more Smart Citation