Herbert et al., 2023 - Google Patents
A world full of privacy and security (mis) conceptions? findings of a representative survey in 12 countriesHerbert et al., 2023
View PDF- Document ID
- 3173011343916502476
- Author
- Herbert F
- Becker S
- Schaewitz L
- Hielscher J
- Kowalewski M
- Sasse A
- Acar Y
- Dürmuth M
- Publication year
- Publication venue
- Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems
External Links
Snippet
Misconceptions about digital security and privacy topics in the general public frequently lead to insecure behavior. However, little is known about the prevalence and extent of such misconceptions in a global context. In this work, we present the results of the first large-scale …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zimmermann et al. | The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes | |
Alsharif et al. | Impact of Human Vulnerabilities on Cybersecurity. | |
Herbert et al. | A world full of privacy and security (mis) conceptions? findings of a representative survey in 12 countries | |
Redmiles et al. | I think they're trying to tell me something: Advice sources and selection for digital security | |
Mayer et al. | " Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them | |
Rader et al. | Identifying patterns in informal sources of security information | |
Grama | Legal and privacy issues in information security | |
Das et al. | Breaking! A typology of security and privacy news and how it's shared | |
Nthala et al. | Informal support networks: an investigation into home data security practices | |
Sarabi et al. | Risky business: Fine-grained data breach prediction using business profiles | |
Pelteret et al. | A review of information privacy and its importance to consumers and organizations | |
Xiong et al. | Embedding training within warnings improves skills of identifying phishing webpages | |
Ali et al. | Phishing—A cyber fraud: The types, implications and governance | |
Gibson et al. | Vulnerability in massive api scraping: 2021 linkedin data breach | |
Kano et al. | Trust factors of social engineering attacks on social networking services | |
Ray et al. | “Warn them” or “just block them”?: investigating privacy concerns among older and working age adults | |
Al-Daraiseh et al. | Social networks’ benefits, privacy, and identity theft: KSA case study | |
Bellini et al. | The {Digital-Safety} risks of financial technologies for survivors of intimate partner violence | |
Garcia et al. | Phishing in social media: Investigating training techniques on Instagram shop | |
Chitare et al. | “It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in Organisations | |
SCHAEWITZ et al. | A World Full of Privacy and Security (Mis) conceptions? Findings of a Representative Survey in 12 Countries | |
Ahmed et al. | Impact and significance of human factors in digital information security | |
Guntrum | Keyboard Fighters: The Use of ICTs by Activists in Times of Military Coup in Myanmar | |
Abraham et al. | “I’m Doing the Best I Can.” Understanding Technology Literate Older Adults’ Account Management Strategies | |
Edwards et al. | SMiShing attack vector: Surveying end-user behavior, experience, and knowledge |