Filters








5,373 Hits in 3.5 sec

Contextualized Web Warnings, and How They Cause Distrust [chapter]

Steffen Bartsch, Melanie Volkamer, Heike Theuerling, Fatih Karayumak
2013 Lecture Notes in Computer Science  
while they solve Web browsing tasks.  ...  Moreover, we identify conflicting effects from contextualization, including distrust in the content, and formulate recommendations for effective contextualized warning content.  ...  We thank Michaela Kauer and Christoph Seikel for their support on designing and conducting the pre-study.  ... 
doi:10.1007/978-3-642-38908-5_16 fatcat:ywk265ytwvaxtkevlvxygwei5a

Adapting Security Warnings to Counter Online Disinformation [article]

Ben Kaiser, Jerry Wei, Eli Lucherini, Kevin Lee, J. Nathan Matias, Jonathan Mayer
2021 arXiv   pre-print
We found that users routinely ignore contextual warnings, but users notice interstitial warnings -- and respond by seeking information from alternative sources.  ...  In an initial laboratory study, we used a simulated search task to examine contextual and interstitial disinformation warning designs.  ...  Acknowledgments We thank Marshini Chetty and Elissa Redmiles for valuable early feedback on this work. Simone Fischer-Hübner provided thoughtful shepherding for our paper.  ... 
arXiv:2008.10772v6 fatcat:chknthuvkrdodimsc6tzhi5jge

Phishing in Organizations: Findings from a Large-Scale and Long-Term Study [article]

Daniele Lain, Kari Kostiainen, Srdjan Capkun
2021 arXiv   pre-print
One example of such results is good effectiveness of warnings on emails. Second, some of our results contradict prior literature and common industry practices.  ...  We also deployed a reporting button to the company's email client which allowed the participants to report suspicious emails they received.  ...  They asked the respondent if they remembered son of features in a crowdsourced phishing warning system,” Information noticing the tool in the past 12 months and using it, and what Systems  ... 
arXiv:2112.07498v1 fatcat:jjgfxbc56ja5vctl4w4oc4uliy

Conditioned-safe ceremonies and a user study of an application to web authentication

Chris Karlof, J. D. Tygar, David Wagner
2009 Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS '09  
Our formulation of a conditioned-safe ceremony draws on several ideas and lessons learned from the human factors and human reliability community: forcing functions, defense in depth, and the use of human  ...  We simulated attacks against the users and found that email registration was significantly more secure than challenge question based registration.  ...  Acknowledgments This work is supported in part by the TRUST Project (National Science Foundation award number CCF-0424422) and the iCAST Project.  ... 
doi:10.1145/1572532.1572578 dblp:conf/soups/KarlofTW09 fatcat:gyxsixxlsvcdfbfa35nfyum5ie

Social and Q&A interfaces for app download

G. Dini, P. Foglia, C.A. Prete, M. Zanda
2014 Information Processing & Management  
Finally, common name merchants tend to support an RS as they want to achieve visibility and, contextually, be trusted by end users.  ...  Complex Web interfaces and fraudulent software houses have caused serious problems such as spreading dialers, spywares and other threats (Shukla & Nah, 2005) .  ... 
doi:10.1016/j.ipm.2014.02.005 fatcat:5afngyv7bfe2xevxmgalfp32ja

Barriers to Online Dementia Information and Mitigation

Emma Dixon, Jesse Anderson, Diana Blackwelder, Mary L. Radnofsky, Amanda Lazar
2022 CHI Conference on Human Factors in Computing Systems  
We discuss how HCI researchers may apply these fndings towards new technical approaches and standards concerning information accessibility and credibility for neurodiverse populations.  ...  Yet, there remains a need to understand the barriers that are posed by the way our platforms are designed as well as how we might overcome these barriers for people with dementia.  ...  due to web-page design and perceived hidden agendas.  ... 
doi:10.1145/3491102.3517554 fatcat:ftjq5aibzbbatgz3w4mortleze

A Social-Feedback Enriched Interface for Software Download

Gianluca Dini, Pierfrancesco Foglia, C. Antonio Prete, Michele Zanda
2013 Journal of Organizational and End User Computing  
They should provide usable interactions and support users when deciding whether to accept the software product or not.  ...  of the European Community, the Italian Government and private companies.  ...  Finally, common name merchants tend to support the RS as they want to achieve visibility and, contextually, be trusted by end users.  ... 
doi:10.4018/joeuc.2013010102 fatcat:n6evmuyaxzgg7h6papy4urfvg4

Participatory Culture in Memory Institutions: of Diversity, Ethics and Trust?

Chern Li Liew, Ferne Cheetham
2016 D-Lib Magazine  
They provide the additional contextual information which surrounds the original resources.  ...  Deodata (2014) is critical of definitions of participatory culture in a similar way, stating that they are limited by a lack of answers to questions such as who is participating, and how and why are they  ... 
doi:10.1045/july2016-liew fatcat:2yq47b5ebrd7nj6rpoi7qd2kxe

Cultural factors in livestock emergency management

Marjan Leneman, Eva Jordans, Katinka de Balogh de Balogh
2021 Australian Journal of Emergency Management  
Despite the institutionalisation of volcanic eruption early warning and response systems, casualties are still seen among local farmers who are reluctant to evacuate.  ...  , including the meaning given to volcanoes and livestock.  ...  Introduction Disaster mitigation and emergency response are contextual and complex.  ... 
doi:10.47389/36.3.69 fatcat:inc33m4orbaw3eg4a34fjwg5wm

A Two-Process View of Trust and Distrust Building in Recommendation Agents: A Process-Tracing Study

Sherrie Komiak, Izak Benbasat
2008 Journal of the AIS  
This paper proposes a two-process view of trust and distrust building, i.e., that trust-building and distrust-building processes are distinct and separate.  ...  In this view, trust and distrust are quantitatively rather than qualitatively different. This view indicates that trust and distrust cannot co-exist.  ...  Literature on Trust and Distrust Theoretical Controversy on the Relationship between Trust and Distrust Researchers usually agree that distrust is related to trust, but they seem to disagree on how they  ... 
doi:10.17705/1jais.00180 fatcat:ripewjf2ivdh3hug2vhooavnxy

Misinformation and Its Correction

Stephan Lewandowsky, Ullrich K. H. Ecker, Colleen M. Seifert, Norbert Schwarz, John Cook
2012 Psychological Science in the Public Interest  
We consider how people assess the truth of statements and what makes people believe certain things but not others.  ...  and, ironically, increase misbelief.  ...  Declaration of Conflicting Interests The authors declared that they had no conflicts of interest with respect to their authorship or the publication of this article.  ... 
doi:10.1177/1529100612451018 pmid:26173286 fatcat:qzwgomlxvbcilectnacv6x53bi

Guidance on communicating about uncertainties in nuclear emergency management

T. Perko, L. Benighaus, Y. Tomkiv, H.V. Wolf
2020 Radioprotection - Revue de la Societé Francaise de Radioprotection  
For this purpose, qualitative and quantitative research methods were applied in different European countries.  ...  Based on the results of these studies, we have formulated guidelines for efficient and effective communication about uncertainties that can be used in nuclear or radiological emergencies.  ...  Responsibility for the information and views expressed therein lies entirely with the authors. The European Commission is not responsible for any use that may be made of the information it contains.  ... 
doi:10.1051/radiopro/2020028 fatcat:sdjkbvj62ncwljms36q7keflbm

Using Adolescent eHealth Literacy To Weigh Trust in Commercial Web Sites

Thomas Hove, Hye-Jin Paek, Thomas Isaacson
2011 Journal of Advertising Research  
, and how they might determine which kinds of health information have those characteristics.  ...  inten- tions is to develop distrust toward com- mercial Web sites.  ... 
doi:10.2501/jar-51-3-524-537 fatcat:lozplxrcpfebhhic2ynxv4twle

Communication-related vulnerability to disasters: A heuristic framework

Sten Hansson, Kati Orru, Andra Siibak, Asta Bäck, Marco Krüger, Friedrich Gabel, Claudia Morsut
2020 International Journal of Disaster Risk Reduction  
shape how people access, understand, and act upon information about hazards.  ...  of how the new media environments may transform the ways people learn about hazards and cope with disasters.  ...  may vary due to the interrelations between individual and contextual factors (e.g., [12] ).  ... 
doi:10.1016/j.ijdrr.2020.101931 fatcat:zka5yf3utfhhtnclrjcarvzcpy

Got Phished? Internet Security and Human Vulnerability

Sanjay Goel, Kevin Williams, Ersin Dincelli
2017 Journal of the AIS  
This study addresses how contextualization of phishing emails for targeted groups impacts their susceptibility to phishing.  ...  A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception.  ...  We also asked participants how motivated they would be to receive the outcome depicted in the email and how much they valued the outcome.  ... 
doi:10.17705/1jais.00447 fatcat:cvpdf5gncfffvpmrjrv6gnc4v4
« Previous Showing results 1 — 15 out of 5,373 results