Perception of risky security behaviour by users: Survey of current approaches

4Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

What constitutes risky security behaviour is not necessarily obvious to users and as a consequence end-user devices could be vulnerable to compromise. This paper seeks to lay the groundwork for a project to provide instant warning via automatic recognition of risky behaviour. It examines three aspects of the problem, behaviour taxonomy, techniques for its monitoring and recognition and means of giving appropriate feedback. Consideration is given to a way of quantifying the perception of risk a user may have. An ongoing project is described in which the three aspects are being combined in an attempt to better educate users to the risks and consequences of poor security behaviour. The paper concludes that affective feedback may be an appropriate method for interacting with users in a browser-based environment. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Shepherd, L. A., Archibald, J., & Ferguson, R. I. (2013). Perception of risky security behaviour by users: Survey of current approaches. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8030 LNCS, pp. 176–185). Springer Verlag. https://doi.org/10.1007/978-3-642-39345-7_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free