- Privacy, Security, and Data Protection
- User Authentication and Security Systems
- Historical, Religious, and Philosophical Studies
- Classical Antiquity Studies
- Classical Philosophy and Thought
- American Constitutional Law and Politics
- Medieval Literature and History
- Scottish History and National Identity
- Ancient Near East History
- Byzantine Studies and History
- Spam and Phishing Detection
- Innovative Human-Technology Interaction
- Eurasian Exchange Networks
- American Sports and Literature
- Advanced Malware Detection Techniques
- Academic and Historical Perspectives in Psychology
- Folklore, Mythology, and Literature Studies
- Gambling Behavior and Treatments
- Misinformation and Its Impacts
- Evolution and Science Education
- Historical Art and Culture Studies
- Cybercrime and Law Enforcement Studies
- Green IT and Sustainability
- Historical and Linguistic Studies
- Historical and Religious Studies of Rome
Indiana University Bloomington
2019-2024
Indiana University
2020-2022
Recent years have seen growing organizational adoption of two-factor authentication as organizations seek to limit the damage caused by password breaches. However, research on user experience in a real-world setting is relatively scant. To fill this gap, we conducted multiple waves an online survey users at large public university during its multi-phase rollout mandatory for faculty, staff, and students. In addition, examined months logs all events university. We found no significant changes...
When studying technologies pertaining to health, wellness, accessibility, and aging, researchers are often required perform a balancing act between controlling sharing sensitive data of the people in their studies protecting privacy these participants. If can be anonymized shared, it boost impact research by facilitating replication extension. Despite anonymization, reporting may lead re-identification participants, which particularly problematic when deals with topics, such as health. We...
Preventing workplace phishing depends on the actions of every employee, regardless cybersecurity expertise. Based 24 semi-structured interviews with mid-career office workers (70.8% women, averaging 44 years old) at two U.S. universities, we found that less than 21% our participants had any formal anti-phishing training. Much what know about comes from informal sources emphasize "tips" and "tricks" like those in conversations friends, news stories, newsletters, social media, podcasts. These...
Phishing attacks, in which deceptive messages purporting to be from a legitimate contact are used trick recipients and acquire sensitive information for the purposes of committing fraud, substantial growing problem organizations. IT departments professionals may put place variety institutional responses thwart such but an organization's susceptibility phishing also depends on decisions actions individual employees. These employees have little expertise still need react attempts daily basis....
Authentication using passwords requires three cognitively difficult actions. First, a good password generation of high level entropy. Then the person must reliably recall that highly entropic password. Finally, properly map to context. The common implementation and interaction designs studies increase these challenges. We present system offers entropy user by providing randomly-selected visuals, leverages this source for creation, then further utilizes visual cue simplify contextualization....
Studies of privacy perception in the Internet Things (IoT) include in-laboratory evaluations as well investigations purchase decisions, deployment, and long-term use. In this study, we implemented identical IoT configurations eight households to evaluate installation concerns early adoption devices our participants' homes. The specific contributions work are insights into perceptions challenges networked smart home management devices. focus was on about deployed an ecosystem influencing...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
Solutions to phishing have included discrete training, stand-alone warnings,and automatic blocking. We integrated personalized blocking, filtering, and alerts into a single holistic risk-management tool, which leverages simple metaphorical cartoons that function both as risk communication controls for browser settings. tested the tool in two experiments. The first experiment was four-week naturalistic study where we examined acceptability usability of tool. experimental group exposed fewer...