Abstract
What constitutes risky security behaviour is not necessarily obvious to users and as a consequence end-user devices could be vulnerable to compromise. This paper seeks to lay the groundwork for a project to provide instant warning via automatic recognition of risky behaviour. It examines three aspects of the problem, behaviour taxonomy, techniques for its monitoring and recognition and means of giving appropriate feedback. Consideration is given to a way of quantifying the perception of risk a user may have. An ongoing project is described in which the three aspects are being combined in an attempt to better educate users to the risks and consequences of poor security behaviour. The paper concludes that affective feedback may be an appropriate method for interacting with users in a browser-based environment.
Original language | English |
---|---|
Title of host publication | Human aspects of information security, privacy, and trust |
Subtitle of host publication | first international conference, HAS 2013 held as part of HCI International 2013 Las Vegas, NV, USA, July 21-26, 2013: proceedings |
Editors | Louis Marinos, Ioannis Askoxylakis |
Place of Publication | Berlin |
Publisher | Springer-Verlag |
Pages | 176-185 |
Number of pages | 10 |
ISBN (Electronic) | 9783642393457 |
ISBN (Print) | 9783642393440 |
DOIs | |
Publication status | Published - 2013 |
Event | 1st International Conference on Human Aspects of Information Security, Privacy and Trust - Las Vegas, United States Duration: 20 Jul 2013 → 25 Jul 2013 Conference number: 1 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer-Verlag |
Number | 8030 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 1st International Conference on Human Aspects of Information Security, Privacy and Trust |
---|---|
Abbreviated title | HAS 2013 |
Country/Territory | United States |
City | Las Vegas |
Period | 20/07/13 → 25/07/13 |
Keywords
- End-user security behaviours
- Usable security
- Risk perception
- Affective computing
- User feedback
- Security awareness
- User monitoring techniques