Nudges for privacy and security: Understanding and assisting users' choices online

A Acquisti, I Adjerid, R Balebako… - ACM Computing …, 2017 - dl.acm.org
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …

A systematic review on security of E-commerce systems

S Badotra, A Sundas - International Journal of Applied Science and …, 2021 - gigvvy.com
With the emergence of digitalization, making the use of Internet almost for everything is not a
new trend. The maximum use of it is in the E-commerce systems. Most of the customers are …

[PDF][PDF] Crying wolf: An empirical study of ssl warning effectiveness.

J Sunshine, S Egelman, H Almuhimedi, N Atri… - USENIX security …, 2009 - usenix.org
Web users are shown an invalid certificate warning when their browser cannot validate the
identity of the websites they are visiting. While these warnings often appear in benign …

Man-in-the-Middle Attack to the HTTPS Protocol

F Callegati, W Cerroni, M Ramilli - IEEE Security & Privacy, 2009 - ieeexplore.ieee.org
Web-based applications rely on the HTTPS protocol to guarantee privacy and security in
transactions ranging from home banking, e-commerce, and e-procurement to those that deal …

" I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach

Y Zou, AH Mhaidli, A McCall, F Schaub - Fourteenth Symposium on …, 2018 - usenix.org
Equifax, one of the three major US credit bureaus, experienced a large-scale data breach in
2017. We investigated consumers' mental models of credit bureaus, how they perceive risks …

The effect of developer-specified explanations for permission requests on smartphone user behavior

J Tan, K Nguyen, M Theodorides… - Proceedings of the …, 2014 - dl.acm.org
In Apple's iOS 6, when an app requires access to a protected resource (eg, location or
photos), the user is prompted with a permission request that she can allow or deny. These …

Influence of privacy attitude and privacy cue framing on android app {Choices}

P Rajivan, J Camp - Twelfth Symposium on Usable Privacy and Security …, 2016 - usenix.org
Transmission of personally identifiable information from smartphone apps has become
ubiquitous as smartphones themselves. Privacy controls currently provided in the form of …

Danger is my middle name: experimenting with SSL vulnerabilities in Android apps

L Onwuzurike, E De Cristofaro - Proceedings of the 8th ACM Conference …, 2015 - dl.acm.org
This paper presents a measurement study of information leakage and SSL vulnerabilities in
popular Android apps. We perform static and dynamic analysis on 100 apps, downloaded at …

Improving security decisions with polymorphic and audited dialogs

JC Brustoloni, R Villamarín-Salomón - … of the 3rd symposium on Usable …, 2007 - dl.acm.org
Context-sensitive guidance (CSG) can help users make better security decisions.
Applications with CSG ask the user to provide relevant context information. Based on such …

Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties

I Dacosta, M Ahamad, P Traynor - … on Research in Computer Security, Pisa …, 2012 - Springer
The security guarantees provided by SSL/TLS depend on the correct authentication of
servers through certificates signed by a trusted authority. However, as recent incidents have …