Oct 9, 2017 | Research
Advancements in information technology often task users with complex and consequential privacy and security decisions. A growing body of research has investigated individuals’ choices in the presence of privacy and information security tradeoffs, the decision-making...Jul 24, 2013 | Research
We designed and tested attractors for computer security dialogs: user-interface modifications used to draw users’ attention to the most important information for making decisions. Some of these modifications were purely visual, while others temporarily inhibited...Aug 13, 2011 | Research
This report presents the findings of a study which investigated the outcome of password strength and the behaviour; and sentiment of users subjected to four different password-composition policies. Apr 15, 2011 | Research
Computer security warnings are intended to protect users and their computers. However, research suggests that users frequently ignore these warnings. The authors describe a study designed to gain insight into how users perceive and respond to computer alerts....Jul 14, 2010 | Research
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change in the Carnegie Mellon University (CMU) computing services password policy that required...