Mar 9, 2017 | Research
An introduction to the research of Jason Hong, Sauvik Das, Tiffany Hyun-Jin Kim and Laura Dabbish, who are investigating how social influence affects cyber security and testing how social influence techniques can improve people’s awareness and knowledge of...Nov 3, 2014 | Research
One of the largest outstanding problems in computer security is the need for higher awareness and use of available security tools. One promising but largely unexplored approach is to use social proof: by showing people that their friends use security features, they...Aug 13, 2014 | Research
Even though there has been an increased effort to increase security sensitivity amongst the population, most individuals ignore security advice. This paper found a few social influence processes – processes that influence the behaviours of individuals with words and...Jan 1, 2012 | Research
This article discusses phishing attacks. It introduces the anatomy of a phishing attack, considers why people fall for phishing attacks and estimates the damage of phishing attacks. The article also discusses common tecniques for preventing phishing....May 20, 2011 | Research
While past work has examined password usage on a specific computer, web site, or organization, there is little work examining overall password usage in daily life. Through a diary study, we examine all usage of passwords, and offer some new findings based on...