Reducing risky security behaviours: utilising affective feedback to educate users

    Research output: Contribution to conferencePaper

    108 Downloads (Pure)

    Abstract

    Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The paper provides an overview of behaviour considered to be risky, explaining potential threats users may face online. Existing tools developed to reduce risky security behaviours in end-users have been compared, discussing the success rate of various methodologies. Ongoing research is described which attempts to educate users regarding the risks and consequences of poor security behaviour by providing the appropriate feedback on the automatic recognition of risky behaviour. The paper concludes that a solution utilising a browser extension is a suitable method of monitoring potentially risky security behaviour. Ultimately, future work seeks to implement an affective feedback mechanism within the browser extension with the aim of improving security awareness.
    Original languageEnglish
    Pages7-14
    Number of pages8
    Publication statusPublished - 23 Jun 2014
    Event4th International Conference on Cybercrime, Security & Digital Forensics - University of Strathclyde, Glasgow, United Kingdom
    Duration: 23 Jun 201424 Jun 2014
    Conference number: 4

    Conference

    Conference4th International Conference on Cybercrime, Security & Digital Forensics
    Abbreviated titleCyberforensics 2014
    Country/TerritoryUnited Kingdom
    CityGlasgow
    Period23/06/1424/06/14

    Keywords

    • Usable security
    • End-user security behaviours
    • Affective computing
    • User monitoring techniques
    • Feedback
    • Security awareness

    Fingerprint

    Dive into the research topics of 'Reducing risky security behaviours: utilising affective feedback to educate users'. Together they form a unique fingerprint.

    Cite this