Matt Dixon

ORCID: 0000-0002-8928-3961
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Spam and Phishing Detection
  • Advanced Malware Detection Techniques
  • Misinformation and Its Impacts
  • Technology Use by Older Adults
  • User Authentication and Security Systems
  • Suicide and Self-Harm Studies
  • Internet Traffic Analysis and Secure E-voting
  • Cybercrime and Law Enforcement Studies
  • Personal Information Management and User Behavior
  • Hate Speech and Cyberbullying Detection
  • Digital Mental Health Interventions
  • Resilience and Mental Health
  • Cyberloafing and Workplace Behavior
  • COVID-19 and Mental Health

Northumbria University
2019-2023

Background Phishing is a major threat to the data and infrastructure of healthcare organizations many cyberattacks utilize this socially engineered pathway. simulation used identify weaknesses risks in human defences organizations. There are factors influencing difficulty detecting phishing email including fatigue nature deceptive message. Method A Italian Hospital with over 6000 staff performed as part its annual training risk assessment. Three campaigns were launched at approx. 4-month...

10.1177/20552076221081716 article EN cc-by-nc-nd Digital Health 2022-01-01

Known age differences exist in relation to information and communication technology (ICT) use, attitudes, access, literacy. Less is known about cybersecurity risks associated behaviours. Using an online survey, this study analyses data from 579 participants investigate across four key behaviours: device securement, password generation, proactive checking, software updating. Significant were found; however, not a straightforward relationship. Older users appear less likely secure their...

10.1155/2022/2693080 article EN cc-by Human Behavior and Emerging Technologies 2022-10-21

Older adults can struggle to access relevant community expertise when faced with new situations. One such situation is the number of cyberattacks they may face interacting online. This paper reports on an initiative which recruited, trained, and supported older become cybersecurity educators (CyberGuardians), tasked promoting best practice within their communities prevent falling victim opportunistic cyberattacks. utilised embedded peer-to-peer information dissemination strategy, rather than...

10.1145/3411764.3445078 article EN 2021-05-06

Young people are increasingly becoming responsible for the security of their devices, yet do not appear to receive formal instruction on how protect themselves online. In this paper, we investigate phish detection performance teenagers while exploring familiarity with a service affects overall in identifying phishing messages. Our study 83 finds that were poor at distinguishing between genuine and messages an experimental task, was affected by service. However, our participants exhibited...

10.1109/eurospw51379.2020.00027 article EN 2020-09-01

Abstract While there has been an upsurge in interest cyber resilience organizations, we know little about the of individuals to attacks. Cyber a domestic or non-work setting is important because that majority people will face threats their use technology across range contexts, and ability resist attack, quickly recover learn from successful as for individuals’ wellbeing it organizations. There is, unfortunately, dearth studies on people, part not clear how such construct could be defined...

10.1093/cybsec/tyad007 article EN cc-by Journal of Cybersecurity 2023-01-01

Phishing continues to be a difficult problem for individuals and organisations. Educational games simulations have been increasingly acknowledged as versatile powerful teaching tools, yet little work has examined how engage users with these games. We explore this by conducting workshops 9 younger adults reporting on their expectations cybersecurity educational find disconnect between casual serious gamers, where gamers prefer simple incorporating humour while demand congruent narrative or...

10.1145/3290607.3313026 article EN 2019-04-30

Phishing emails continue to be a major cause of cybersecurity breaches despite the development technical measures designed thwart these attacks. Most phishing studies have investigated desktop email platforms, but use mobile devices for exchanges has soared in recent years, especially amongst young adults. In this paper, we explore how digital platform (desktop vs. mobile) influences users' phish detection strategies. Twenty-one adults (18-25 years) were asked rate legitimacy using live...

10.1145/3546730 article EN Proceedings of the ACM on Human-Computer Interaction 2022-09-19

Phishing continues to be a difficult problem for individuals and organisations. Educational games simulations have been increasingly acknowledged as enormous powerful teaching tools, yet little work has examined how engage users with these games. We explore this by conducting workshops 9 younger adults reporting on their expectations cybersecurity educational find disconnect between casual serious gamers, where gamers prefer simple incorporating humour while demand congruent narrative or...

10.48550/arxiv.1903.03019 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Smartphones are a central part of modern life and contain vast amounts personal professional data as well access to sensitive features such banking financial apps. As protecting our smartphones from unauthorised is great importance, users prioritise this over their devices against digital security threats. Previous research has explored user experiences smartphone – though the majority these cases involve an attacker who known knows unlock code for device. We presented 374 participants with...

10.1145/3617072.3617104 article EN 2023-10-13

As smartphones overtake personal computers as the device of choice for internet access and everyday digital tasks, cybersecurity becomes a pressing issue platform. Research has found that smartphone users appear to act less securely than they would on PC, but reasons this are unclear. The technology, threats, role have all developed in recent years, paper examines what security looks like 2020s. We interviewed 27 about their attitudes behaviours. find place great emphasis on, take...

10.1145/3617072.3617112 article EN 2023-10-13
Coming Soon ...