Phishing counter measures and their effectiveness–literature review

S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …

Usability, security and trust in password managers: A quest for user-centric properties and features

S Chaudhary, T Schafeitel-Tähtinen, M Helenius… - Computer Science …, 2019 - Elsevier
A password manager stores and handles users' passwords from different services. This
relieves the users from constantly remembering and recalling many different login …

Tapas: design, implementation, and usability evaluation of a password manager

D McCarney, D Barrera, J Clark, S Chiasson… - Proceedings of the 28th …, 2012 - dl.acm.org
Passwords continue to prevail on the web as the primary method for user authentication
despite their well-known security and usability drawbacks. Password managers offer some …

[图书][B] A user-tailored approach to privacy decision support

BP Knijnenburg - 2015 - search.proquest.com
As an increasingly important part of our social, professional and financial lives happens
online, the frequency with which we have to deal with privacy problems is ever on the rise. In …

[PDF][PDF] Counteracting the negative effect of form auto-completion on the privacy calculus

BP Knijnenburg, A Kobsa, H Jin - 2013 - Citeseer
When filling out web forms, people typically do not want to submit every piece of requested
information to every website. Instead, they selectively disclose information after weighing the …

Human-machine interactions with clinical phrase prediction system, aligning with Zipf's least effort principle?

J Zaghir, M Bjelogrlic, JP Goldman, J Ehrsam… - PloS one, 2024 - journals.plos.org
The essence of language and its evolutionary determinants have long been research
subjects with multifaceted explorations. This work reports on a large-scale observational …

Password managers: Comparative evaluation, design, implementation and empirical analysis

D McCarney - 2013 - repository.library.carleton.ca
Passwords continue to prevail as the primary method for user authentication, despite well-
known drawbacks. Password managers offer improvement without the deployment barrier of …

How safe is safety number? A user study on SIGNAL's fingerprint and safety number methods for public key verification

K Bicakci, E Altuncu, MS Sahkulubey… - … Conference, ISC 2018 …, 2018 - Springer
Communication security has become an indispensable demand of smartphone users. End-
to-end encryption is the key factor for providing communication security, which mainly relies …

[PDF][PDF] Zero factor authentication: a four-year study of simple password-less website security via one-time emailed tokens

S Andrés - J. Inf. Secur. Appl, 2015 - homelandsecurity.sdsu.edu
Static passwords are the easiest and most well known form of authentication for websites.
But they carry with them some dangers. Users may select weak passwords that open them …

[图书][B] Security design flaws that affect usability in online banking

S Gurlen - 2013 - search.proquest.com
As the popularity of online banking Websites has increased, the security of these sites has
become increasingly critical as attacks against these sites are on the rise. However, the …