Perception of risky security behaviour by users: survey of current approaches

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

What constitutes risky security behaviour is not necessarily obvious to users and as a consequence end-user devices could be vulnerable to compromise. This paper seeks to lay the groundwork for a project to provide instant warning via automatic recognition of risky behaviour. It examines three aspects of the problem, behaviour taxonomy, techniques for its monitoring and recognition and means of giving appropriate feedback. Consideration is given to a way of quantifying the perception of risk a user may have. An ongoing project is described in which the three aspects are being combined in an attempt to better educate users to the risks and consequences of poor security behaviour. The paper concludes that affective feedback may be an appropriate method for interacting with users in a browser-based environment.
Original languageEnglish
Title of host publicationHuman aspects of information security, privacy, and trust
Subtitle of host publicationfirst international conference, HAS 2013 held as part of HCI International 2013 Las Vegas, NV, USA, July 21-26, 2013: proceedings
EditorsLouis Marinos, Ioannis Askoxylakis
Place of PublicationBerlin
PublisherSpringer-Verlag
Pages176-185
Number of pages10
ISBN (Electronic)9783642393457
ISBN (Print)9783642393440
DOIs
Publication statusPublished - 2013
Event1st International Conference on Human Aspects of Information Security, Privacy and Trust - Las Vegas, United States
Duration: 20 Jul 201325 Jul 2013
Conference number: 1

Publication series

NameLecture Notes in Computer Science
PublisherSpringer-Verlag
Number8030
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Conference on Human Aspects of Information Security, Privacy and Trust
Abbreviated titleHAS 2013
CountryUnited States
CityLas Vegas
Period20/07/1325/07/13

Fingerprint Dive into the research topics of 'Perception of risky security behaviour by users: survey of current approaches'. Together they form a unique fingerprint.

  • Cite this

    Shepherd, L. A., Archibald, J., & Ferguson, R. I. (2013). Perception of risky security behaviour by users: survey of current approaches. In L. Marinos, & I. Askoxylakis (Eds.), Human aspects of information security, privacy, and trust: first international conference, HAS 2013 held as part of HCI International 2013 Las Vegas, NV, USA, July 21-26, 2013: proceedings (pp. 176-185). (Lecture Notes in Computer Science; No. 8030). Springer-Verlag. https://doi.org/10.1007/978-3-642-39345-7_19