Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy

M Wei, P Emami-Naeini, F Roesner… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Gender stereotypes remain common in US society and harm people of all genders.
Focusing on binary genders (women and men) as a first investigation, we empirically study …

Share or Protect: Understanding the Interplay of Trust, Privacy Concerns, and Data Sharing Purposes in Health and Well-Being Apps

A Kitkowska, F Karegar, E Wästlund - … of the 15th Biannual Conference of …, 2023 - dl.acm.org
The popularity of health and well-being applications is on the rise. These applications often
collect and process personal and sensitive information about individuals for different …

Cognitively available cybersecurity: A systematic literature review

J Kävrestad, B Naqvi - International Conference on Human-Centred …, 2024 - Springer
Cybersecurity is imperative to safeguard the digital systems on which the world has come to
rely. A core part of cybersecurity is users' ability to adopt protective behavior by using …

Uncovering the neural processes of privacy: a neurally informed behavioral intervention to protect information privacy

C Reeck, X Guo, A Dimoka… - Information systems …, 2024 - pubsonline.informs.org
People are increasingly aware that their information is being tracked online. Although
people generally self-report privacy to be important to them, in practice they often disclose …

Examining the Low-Resolution Electromagnetic Tomography Technique for EEG Brain Mapping: Towards Methodological Advancement for IS Research

GP Tejay, ZA Mohammed - ACM SIGMIS Database: the DATABASE for …, 2023 - dl.acm.org
NeuroIS presents a new opportunity for information systems research. Often used
neuroscience techniques include brain mapping with the functional magnetic resonance …

Experimental study to assess the impact of timers on user susceptibility to phishing attacks

AE Antonucci, Y Levy… - Journal of …, 2022 - digitalcommons.kennesaw.edu
Social engineering costs organizations billions of dollars. It exploits the weakest link of
information systems security, the users. It is well-documented in literature that users continue …

Navigating More than a Decade of Neuroscience Integration to Shape Business Strategies

T Pipitwanichakarn - วารสาร วิทยาลัย นครราชสีมา สาขา มนุษยศาสตร์ …, 2024 - so03.tci-thaijo.org
Advances in theoretical knowledge have led neuroscience to intersect with social science,
notably in the realm of neuromarketing—a sub-branch of social neuroscience. Within the …

A Neurophysiological Exploration of Human Behavior in User-Centered Cybersecurity

C Arisoy - 2023 - oaktrust.library.tamu.edu
In today's digital era, where security is paramount due to the ever-increasing prevalence of
cyber threats, the conventional emphasis on technical cybersecurity measures has evolved …

Pause for a Cybersecurity Cause: Assessing the Influence of a Waiting Period on User Habituation in Mitigation of Phishing Attacks

AE Antonucci - 2021 - search.proquest.com
Social engineering costs organizations billions of dollars a year. Social engineering exploits
the weakest link of information security systems, the people who are using them. Phishing is …

Ensuring Usable Cybersecurity for All: Examining Cognitive Disabilities from Research to Industry

B Naqvi, J Kävrestad, A Islam - Available at SSRN 4609555 - papers.ssrn.com
The study aims to examine the state of the art concerning consideration of cognitive
disabilities in the design and development of security systems and services. It is in line with …