[HTML][HTML] {ZBCAN}: A {Zero-Byte}{CAN} Defense System

K Serag, R Bhatia, A Faqih, MO Ozmen… - 32nd USENIX Security …, 2023 - usenix.org
In larger organisations, the security controls and policies that protect employees are typically
managed by a Chief Information Security Officer (CISO). In research, industry, and policy …

{“Employees} Who {Don't} Accept the Time Security Takes Are Not Aware {Enough”}: The {CISO} View of {Human-Centred} Security

J Hielscher, U Menges, S Parkin, A Kluge… - 32nd USENIX Security …, 2023 - usenix.org
In larger organisations, the security controls and policies that protect employees are typically
managed by a Chief Information Security Officer (CISO). In research, industry, and policy …

Contemplating human-centred security & privacy research: Suggesting future directions

K Renaud, S Flowerday - Journal of Information Security and Applications, 2017 - Elsevier
This position paper is a reflective look at the state of Human-Centred Security & Privacy
(HCSP) research and the paradigms that have informed and driven the research. It is …

A new hope: Human-centric cybersecurity research embedded within organizations

PL Morgan, PM Asquith, LM Bishop… - … Conference on Human …, 2020 - Springer
Humans are and have been the weakest link in the cybersecurity chain (eg,[1–3]). Not all
systems are adequately protected and even for those that are, individuals can still fall prey to …

Human cyber risk management by security awareness professionals: Carrots or sticks to drive behaviour change?

JM Blythe, A Gray, E Collins - HCI for Cybersecurity, Privacy and Trust …, 2020 - Springer
Cyber crime is rising at an unprecedented rate. Organisations are spending more than ever
combating the human element through training and other interventions, such as simulated …

Rebooting it security awareness–how organisations can encourage and sustain secure behaviours

MA Sasse, J Hielscher, J Friedauer… - European Symposium on …, 2022 - Springer
Most organisations are using online security awareness training and simulated phishing
attacks to encourage their employees to behave securely. Buying off-the-shelf training …

From culture to disobedience: Recognising the varying user acceptance of IT security

S Furnell, KL Thomson - Computer fraud & security, 2009 - Elsevier
It is often observed that addressing security can be as much about people as it is
technology. One of the key aspects here is establishing the correct mindset, and ensuring …

[PDF][PDF] the myths of security: what the computer security industry doesn't want you to know

J Viega - For a complete list of all USENIX & USENIX co …, 2010 - usenix.org
I like the book, but hate the subtitle. Most of the security industry desperately wants you to
know the truth. I don't think the author really believes the subtitle either—surely the security …

Caring for IT security: Accountabilities, moralities, and oscillations in IT security practices

L Kocksch, M Korn, A Poller… - Proceedings of the ACM on …, 2018 - dl.acm.org
Despite being considered a fundamental issue in the design, use, and appropriation of
digital technologies, IT security has found but little attention in CSCW so far. Approaches in …

Developing a human activity model for insider IS security breaches using action design research

G Dhillon, S Samonas, U Etudo - … Security and Privacy Protection: 31st IFIP …, 2016 - Springer
Insider security breaches in organizations have been identified as a pressing problem for
academics and practitioners. The literature generally addresses this problem by focusing on …