Guide to measuring privacy concern: Review of survey and observational instruments

S Preibusch - International journal of human-computer studies, 2013 - Elsevier
The debate about online privacy gives testimony of Web users' concerns. Privacy concerns
make consumers adopt data protection features, guide their appreciation for existing …

[HTML][HTML] The risks of using ChatGPT to obtain common safety-related information and advice

O Oviedo-Trespalacios, AE Peden, T Cole-Hunter… - Safety science, 2023 - Elsevier
ChatGPT is a highly advanced AI language model that has gained widespread popularity. It
is trained to understand and generate human language and is used in various applications …

How effective are social engineering interventions? A meta-analysis

JW Bullee, M Junger - Information & Computer Security, 2020 - emerald.com
Purpose Social engineering is a prominent aspect of online crime. Various interventions
have been developed to reduce the success of this type of attacks. This paper aims to …

Control versus effort in privacy warnings for webforms

K Krol, S Preibusch - Proceedings of the 2016 ACM on Workshop on …, 2016 - dl.acm.org
Webforms are the primary way of collecting information online. However, some users may
wish to limit the amount of personal information they provide and only fill out the minimum …

Priming and warnings are not effective to prevent social engineering attacks

M Junger, L Montoya, FJ Overink - Computers in human behavior, 2017 - Elsevier
Humans tend to trust each other and to easily disclose personal information. This makes
them vulnerable to social engineering attacks. The present study investigated the …

An experience sampling study of user reactions to browser warnings in the field

RW Reeder, AP Felt, S Consolvo, N Malkin… - Proceedings of the …, 2018 - dl.acm.org
Web browser warnings should help protect people from malware, phishing, and network
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …

Tuning out security warnings

A Vance, JL Jenkins, BB Anderson, DK Bjornn… - MIS Quarterly, 2018 - JSTOR
Research in the fields of information systems and human-computer interaction has shown
that habituation—decreased response to repeated stimulation—is a serious threat to the …

Why do users not report spear phishing emails?

Y Kwak, S Lee, A Damiano, A Vishwanath - Telematics and Informatics, 2020 - Elsevier
Cyber security training programs encourage users to report suspicious spear phishing
emails, and most antiphishing software provide interfaces to assist in the reporting …

From weakest link to security hero: Transforming staff security behavior

SL Pfleeger, MA Sasse, A Furnham - Journal of Homeland Security …, 2014 - degruyter.com
Practitioners, researchers and policy-makers involved with cyber security often talk about
“security hygiene:” ways to encourage users of computer technology to use safe and secure …

Tales of software updates: The process of updating software

K Vaniea, Y Rashidi - Proceedings of the 2016 chi conference on human …, 2016 - dl.acm.org
Updates alter the way software functions by fixing bugs, changing features, and modifying
the user interface. Sometimes changes are welcome, even anticipated, and sometimes they …