1,336 Hits in 6.4 sec

Training and Embedding Cybersecurity Guardians in Older Communities

James Nicholson, Ben Morrison, Matt Dixon, Jack Holt, Lynne Coventry, Jill McGlasson
2021 Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems  
This initiative utilised an embedded peer-to-peer information dissemination strategy, rather than expert-to-citizen, facilitating the inclusion of individuals who would ordinarily be unlikely to seek cybersecurity  ...  CCS CONCEPTS •Security and privacy~Human and societal aspects of security and privacy~Social aspects of security and privacy •Social and professional topics~User characteristics~Age~Seniors •Human-centered  ...  older users who do not possess the knowledge, accessibility, or desire to engage online.  ... 
doi:10.1145/3411764.3445078 fatcat:zvpklhm5pvealib24tpct65pw4

"If It's Important It Will Be A Headline"

James Nicholson, Lynne Coventry, Pamela Briggs
2019 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI '19  
Following a thematic analysis of these interviews, we developed a cybersecurity information access framework that highlights shortcomings in older adults' choice of information resources.  ...  Yet we know relatively little about their understanding of cybersecurity, their information-seeking behaviours, and their trusted sources of information and advice in this domain.  ...  ACKNOWLEDGMENTS The work presented in the paper was funded through the Cybersecurity Across the Lifespan (cSALSA) project (EP/P011446/1) from the Engineering and Physical Sciences Council (EPSRC), UK.  ... 
doi:10.1145/3290605.3300579 dblp:conf/chi/NicholsonCB19 fatcat:uc2ab6q6xbeabedwlr3edbtud4


Ahmed Alruwaili, Deakin University Melbourne, Australia
2019 International Journal of Advanced Research in Computer Science  
This study aimed to review the studies carried out on the impact of training on cybersecurity awareness.  ...  Training on cybersecurity awareness has seen a mixed impact, with some studies claiming that such training has limited results.  ...  According to Bada, Sasse, & Nurse (2014), it has been seen that governments around the world encourage citizens to carry out transactions online and also provide advice on how to go about it in a secure  ... 
doi:10.26483/ijarcs.v10i5.6476 fatcat:gfpsvuerpnfx3d7p2v6jo7byha

Teaching psychological principles to cybersecurity students

Jacqui Taylor, John McAlaney, Sarah Hodge, Helen Thackray, Christopher Richardson, Susie James, John Dale
2017 2017 IEEE Global Engineering Education Conference (EDUCON)  
We pay special attention to the consideration of characteristics of cybersecurity students in terms of teaching psychology in a way that will be accessible and engaging.  ...  We then discuss the development and use of an online training tool which draws on psychology to help educators and companies to raise awareness of cybersecurity risks in students and employees.  ...  Motivation to Study and Learning Style The motivation of students to study a particular course will clearly affect their engagement and there may be some initial resentment of cybersecurity students toward  ... 
doi:10.1109/educon.2017.7943091 dblp:conf/educon/TaylorMHTRJD17 fatcat:jfdnup4q2ngbdh3bg3cn6xn7hq

Security information sharing via Twitter: 'Heartbleed' as a case study

Pam Briggs, Lynne Coventry, Debora Jeske, Andrew R. McNeill
2017 International Journal of Web Based Communities  
This exploratory case study provides an insight into information sharing, potential communities of influence, and points for future research in the absence of a voice of authority in the field of cybersecurity  ...  The current paper outlines an exploratory case study in which we examined the extent to which specific communities of Twitter users engaged with the debate about the security threat known as 'Heartbleed  ...  Acknowledgements The authors would like to thank Joy Backhaus and the anonymous reviewers for their support and feedback.  ... 
doi:10.1504/ijwbc.2017.10005189 fatcat:rhr4t37gwbgjle3ttumv2lxibi

Manar: An Arabic Game-based Application Aimed for Teaching Cybersecurity using Image Processing

Afnan Alsadhan, Asma Alotaibi, Lulu Altamran, Majd Almalki, Moneera Alfulaij, Tarfa Almoneef
2020 International Journal of Advanced Computer Science and Applications  
The application introduces the technology of image processing in a unique way, allowing children to move around and look for objects, which makes the game as interactive as possible to attract children's  ...  Aimed at children from 6 to 12 years old, Manar is an Arabic smartphone game that seeks to build a generation who are well-informed about cybersecurity issues.  ...  It is not the type, size, or computing power of the machine that makes it a server; it is its ability to serve requests that makes a machine a server.  ... 
doi:10.14569/ijacsa.2020.0111051 fatcat:sptnefc4yba57dqymbzxkp3w44

Understanding Young People's Experiences of Cybersecurity

James Nicholson, Julia Terry, Helen Beckett, Pardeep Kumar
2021 European Symposium on Usable Security 2021  
We discuss the role of schools in cybersecurity education and how to best embed this content in the curriculum to maximise the engagement of students, including a focus on teaching about cybersecurity  ...  Young people are increasingly becoming responsible for the security of their devices, yet do not appear to have the knowledge to protect themselves online.  ...  We would also like to extend our thanks to Reaching Wider at Swansea University for promoting the workshops and organizing school participation and transport.  ... 
doi:10.1145/3481357.3481520 fatcat:3sqf74texbeblkiqnzdf5ligu4

Coronavirus Social Engineering Attacks: Issues and Recommendations

Ahmed Alzahrani
2020 International Journal of Advanced Computer Science and Applications  
The paper also discusses the psychology behind social engineering and introduces security awareness as a solution to reduce the risk of social engineering attacks.  ...  The number of social engineering attacks is increasing day by day due to people's failure to recognize the attacks.  ...  Alzahrani and Johnson [13] studied the autonomy motivator by investigating whether the user would fall victim to a phishing attack.  ... 
doi:10.14569/ijacsa.2020.0110523 fatcat:6jw7n7yk5felljl6svswv5aona

A Demographic Perspective of Smartphone Security and Its Redesigned Notifications

Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Youki Kadobayashi
2019 Journal of Information Processing  
Moreover, in the developing country settings, most participants tend to avoid certain security advice because they necessitate incurring data charges that take up a high percentage of their incomes.  ...  For instance, developing countries have a very different stance compared to developed ones on how their users perceive device updates.  ...  and system exploitations, there are many theories as to why users do not follow security advice or comply with security guidelines.  ... 
doi:10.2197/ipsjjip.27.773 fatcat:qlkobyxahnavjlr5xu6grwotmq

A Cybersecurity Guide for Using Fitness Devices [article]

Maria Bada, Basie von Solms
2021 arXiv   pre-print
The aim of this paper is to provide cybersecurity guidelines for users in order to take measures to avoid risks when using fitness devices.  ...  Although these devices can offer convenience to consumers, more and more reports are warning of the cybersecurity risks of such devices, and the possibilities for such devices to be hacked and used as  ...  Cybersecurity Awareness of Users Although users might expect a USB stick to be a way of transmitting malware or become a target for hackers, most users do not expect their fitness trackers to be a target  ... 
arXiv:2105.02933v1 fatcat:uovtbenqvjd3bomqg7ikpbpepm

COVID-19 what have we learned? The rise of social machines and connected devices in pandemic management following the concepts of predictive, preventive and personalized medicine

Petar Radanliev, David De Roure, Rob Walton, Max Van Kleek, Rafael Mantilla Montalvo, Omar Santos, La'Treall Maddox, Stacy Cannady
2020 The EPMA Journal  
Despite an abundance of digital methods that could be used in slowing or stopping COVID-19 and future pandemics, the world remains unprepared, and lessons have not been learned from previous cases of pandemics  ...  Review, compare and critically assess digital technology responses to the COVID-19 pandemic around the world.  ...  Availability of data and materials all data file and materials are included in the article, or submitted as supplementing documents. Compliance with ethical standards Authors contributions  ... 
doi:10.1007/s13167-020-00218-x pmid:32839666 pmcid:PMC7391030 fatcat:7b444voakffsjakm7oyxqtvjdi

Why Jenny can't figure out which of these messages is a covert information operation

Tristan Caulfield, Jonathan M. Spring, M. Angela Sasse
2019 Proceedings of the New Security Paradigms Workshop  
Several of the responses to election interference proposed by governments and technology companies so far do not abide by these recommendations and are likely to be ineffective.  ...  Our goal is to provide advice on what interventions on the socio-technical election system are likely to work, and which are likely to fail.  ...  References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation  ... 
doi:10.1145/3368860.3368870 dblp:conf/nspw/CaulfieldSS19 fatcat:l2t4jzscubgszhvi6vfj4diy6a

A Shared Cyber Threat Intelligence Solution for SMEs

Max van Haastrecht, Guy Golpur, Gilad Tzismadia, Rolan Kab, Cristian Priboi, Dumitru David, Adrian Răcătăian, Matthieu Brinkhuis, Marco Spruit
2021 Electronics  
In this paper, we tackle this challenge using a systematic review to discover current state-of-the-art approaches to using shared CTI.  ...  In recent years, we have seen a surge in initiatives to share cyber threat intelligence (CTI) to improve collective cybersecurity resilience.  ...  Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable.  ... 
doi:10.3390/electronics10232913 fatcat:papxsfs77bacpniefs7xvlqi2u

Cybersecurity: A Key Challenge to the Information Age in Sierra Leone

Ibrahim Abdulai Sawaneh, Fatmata Kanko Kamara, Albert Kamara
2021 Asian Journal of Interdisciplinary Research  
It is a cost-effective way of communicating using text-messages, video-messages, and voice-notes as it happens from a source (sender) to the audience (receivers).  ...  Therefore, our paper presented some of the challenges and solutions to cybercrime.  ...  Gratitude goes to Assistant Professor Brima Sesay of the School of Economics at the Wuhan University of Technology for his comments and suggestions. We also like to thank Professor Dr.  ... 
doi:10.34256/ajir2114 fatcat:x2pamejj6rgihgyuexaxarkawi

Taxonomy of Cybersecurity Awareness Delivery Methods: A Countermeasure for Phishing Threats

Asma A. Alhashmi, Abdulbasit Darem, Jemal H. Abawajy
2021 International Journal of Advanced Computer Science and Applications  
Phishing is a serious threat to the Internet users and has become a vehicle for cybercriminals to perpetrate largescale crimes worldwide.  ...  To close this gap, we develop a new taxonomy of the most common cybersecurity training delivery methods and compare them along various factors.  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the approval and the support of this research study by grant no.  ... 
doi:10.14569/ijacsa.2021.0121004 fatcat:ld3idu3b5nc37klaecopq6vev4
« Previous Showing results 1 — 15 out of 1,336 results