iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1145/2899383
Cybersecurity needs you! | Interactions skip to main content
column

Cybersecurity needs you!

Published: 26 April 2016 Publication History
First page of PDF

References

[1]
2013 Data Breach Investigations Report; http://www.verizonenterprise.com/resources/reports/rpdata-breach-investigations-report-2013_en_xg.pdf
[2]
Vidyaraman, S., Chandrasekaran, M., and Upadhyaya, S. Position: The user is the enemy. Proc. of NSFPW. 2007, 75--80.
[3]
West, R. The psychology of security. Communications of the ACM 51, 4 (2008), 34--40.
[4]
Gutzwiller, R.S., Fugate, S., Sawyer, B.D., and Hancock, P.A. (2015). The human factors of cyber network defense. Proc. of HFES. 2015, 322--326.
[5]
Theofanos, M.F. and Pfleeger, S.L. Shouldn't all security be usable? IEEE Security & Privacy 9 (March + April, 2011), 12--17.
[6]
Biddle, R., Chiasson, S., and van Oorschot, P.C. Graphical passwords: Learning from the first twelve years. ACM Computing Surveys 44, 4 (2012), Article 19.

Cited By

View all
  • (2024)Doing cybersecurity at home: a human-centred approach for mitigating attacks in AI-enabled home devicesComputers & Security10.1016/j.cose.2024.104112(104112)Online publication date: Sep-2024
  • (2024)Hidden in Onboarding: Cyber Hygiene Training and AssessmentHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-61379-1_4(53-63)Online publication date: 1-Jun-2024
  • (2023)Six usable privacy heuristicsProceedings of the XXII Brazilian Symposium on Human Factors in Computing Systems10.1145/3638067.3638111(1-11)Online publication date: 16-Oct-2023
  • Show More Cited By

Comments

Information & Contributors

Information

Published In

cover image Interactions
Interactions  Volume 23, Issue 3
May + June 2016
76 pages
ISSN:1072-5520
EISSN:1558-3449
DOI:10.1145/2930854
  • Editors:
  • Ron Wakkary,
  • Erik Stolterman
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 April 2016
Published in INTERACTIONS Volume 23, Issue 3

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Column
  • Popular
  • Pre-selected

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)194
  • Downloads (Last 6 weeks)17
Reflects downloads up to 29 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Doing cybersecurity at home: a human-centred approach for mitigating attacks in AI-enabled home devicesComputers & Security10.1016/j.cose.2024.104112(104112)Online publication date: Sep-2024
  • (2024)Hidden in Onboarding: Cyber Hygiene Training and AssessmentHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-61379-1_4(53-63)Online publication date: 1-Jun-2024
  • (2023)Six usable privacy heuristicsProceedings of the XXII Brazilian Symposium on Human Factors in Computing Systems10.1145/3638067.3638111(1-11)Online publication date: 16-Oct-2023
  • (2023)A Decade of Development of Mental Models in Cybersecurity and Lessons for the FutureProceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media10.1007/978-981-19-6414-5_7(105-132)Online publication date: 8-Mar-2023
  • (2020)Usability Heuristics on Parental Privacy Controls for Smart Toys: from an exploratory map to a confirmatory researchElectronic Commerce Research and Applications10.1016/j.elerap.2020.100984(100984)Online publication date: Jun-2020
  • (2019)A METHOD FOR CLASSIFYING USABILITY FINDINGS TO ENHANCE VALIDATION OF NEW HEURISTICSRevista de Sistemas e Computação10.36558/22372903-2019V9N1-P69:1(96-118)Online publication date: 28-Jun-2019
  • (2019)Graphical Authentication Passcode Memorability: Context, Length, and NumberProceedings of the Human Factors and Ergonomics Society Annual Meeting10.1177/107118131963107763:1(447-451)Online publication date: 20-Nov-2019
  • (2019)Smart toys and children's privacyProceedings of the 37th ACM International Conference on the Design of Communication10.1145/3328020.3353951(1-8)Online publication date: 4-Oct-2019
  • (2019)Using a Game to Explore Notions of Responsibility for Cyber Security in OrganisationsExtended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290607.3312846(1-6)Online publication date: 2-May-2019
  • (2019)Seven HCI Grand ChallengesInternational Journal of Human–Computer Interaction10.1080/10447318.2019.161925935:14(1229-1269)Online publication date: 1-Jul-2019
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media