90 research outputs found
Understanding User\u27s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account
A wide-range of personal and sensitive information are stored in users’ online accounts. Losing access, or an unauthorized access to one of those accounts could put them into the risks of privacy breach, cause financial loss, and compromise their accessibility to important information and documents. A large body of prior work focused on developing new schemes and strategies to protect users’ online security. However, there is a dearth in existing literature to understand users’ strategies and contingency plans to protect their online accounts once they lose access, or identify an unauthorized access to one of their accounts. We addressed this gap in our work, where we conducted semi-structured interview with 59 participants from three different countries: Bangladesh, Turkey, and USA. Our findings reveal the unawareness, misconceptions, and privacy and accessibility concerns of users, which refrain them from taking security-preserving steps to protect their online accounts. We also identified users’ prevention strategies that could put their online security into further risks
How WEIRD is Usable Privacy and Security Research? (Extended Version)
In human factor fields such as human-computer interaction (HCI) and
psychology, researchers have been concerned that participants mostly come from
WEIRD (Western, Educated, Industrialized, Rich, and Democratic) countries. This
WEIRD skew may hinder understanding of diverse populations and their cultural
differences. The usable privacy and security (UPS) field has inherited many
research methodologies from research on human factor fields. We conducted a
literature review to understand the extent to which participant samples in UPS
papers were from WEIRD countries and the characteristics of the methodologies
and research topics in each user study recruiting Western or non-Western
participants. We found that the skew toward WEIRD countries in UPS is greater
than that in HCI. Geographic and linguistic barriers in the study methods and
recruitment methods may cause researchers to conduct user studies locally. In
addition, many papers did not report participant demographics, which could
hinder the replication of the reported studies, leading to low reproducibility.
To improve geographic diversity, we provide the suggestions including
facilitate replication studies, address geographic and linguistic issues of
study/recruitment methods, and facilitate research on the topics for non-WEIRD
populations.Comment: This paper is the extended version of the paper presented at USENIX
SECURITY 202
Recommended from our members
Barriers to Secure ICT in a Maritime Environment
The purpose of the research reported in this thesis was to investigate the barriers to ICT security in a maritime environment so that the findings of the research can be used to develop a secure ICT maritime profile that will be capable of being updated on an on-going basis. This is an important area of research because the maritime sector is increasingly reliant upon ICT yet there is evidence that ICT security and the potential threats and consequences if ICT is not available when needed have not been given the attention they deserve. Indeed, the literature review carried out as part of this research pointed to a big gap in the maritime literature regarding ICT security.
Literature from non-maritime specific fields was used to establish a basic understanding of the barriers most likely to be relevant and provide key terminology for use in this research. Empirical data were collected from semi-structured interviews with Royal Naval personnel and informal discussions with Merchant Navy officers. A robust yet flexible approach was used to interpret the results and thus identify the barriers, many of which are caused by complex interactions between social and technical factors, particularly on-board ships.
Nine barriers to ICT security were revealed. They are: tensions experienced between security experts and ICT users; operational imperatives override security requirements; security requirements impeding business process; a limited ability to recover from disruption; unable or unwilling to share security incident information; Inadequate security training; disruption to situational awareness; unpredictable behaviour of people in difficult situations; and a lack of ICT security awareness. A new understanding of barriers arose from further interpretation of the findings, the results of which led to recommendations for the design for an updateable maritime ICT security profile that could be used to guide relevant staff (including Ship’s Security Officers) and as a tool to raise security awareness for non-experts
Driving {2FA} Adoption at Scale: {O}ptimizing Two-Factor Authentication Notification Design Patterns
Licensed to Care: Inhabiting the Transnational Economy of Global Pinoy
The Philippines’ experience in international labour migration is widely considered a success – an observation endorsed by international bodies such as the World Health Organisation. As an active source of professional nurses to the developed world, the country continues to produce more nurses than the local nursing market can employ; a labour strategy that is promoted, facilitated and supported by the Philippine state and nursing educational system. This thesis interrogates Filipino nurse migration through the methodological prism of autoethnography, drawing on first-hand experience and reflexive accounts, interviews, photographs, policy documents and material cultural artefacts, to critically examine and challenge the country’s institutionalised migration regime. The thesis further argues that while the Philippines\u27 culture of migration has been widely reported, understanding this complex phenomenon calls for further and deeper excavation of the social, cultural, political and historical processes that continually shape Filipinos\u27 personal motives and desires. Situated within the fields of cultural studies, media studies and the interdisciplinary field of contemporary migration and diaspora studies, Licensed to Care comprises of an introduction and five chapters. Chapter one tracks the considerations that encouraged me to pursue an autoethnographic genre of writing about Filipino nurse migration by exploring the relationships between myself and my object of study; my life story and my ethnographic practices; and my personal desires, motives and experiences and those of my social actors. To find out how a culture of migration is effectively sustained in the Philippines, I examine the social, cultural and political circumstances of the country in chapter two. In chapter three, I turn my attention to the Americanisation of Philippine nursing education in order to examine the role of the Philippine nursing educational system in shaping the students’ desire to migrate, thus serving to reinforce the identity formation of the ‘global Pinoy’. Utilising the method of visual analysis, I unpack the way in which nursing is marketed through the aggressive use of marketing and advertising brochures in chapter four. In chapter five, I examine critically how several stakeholders cited in the migration literature – international organisations, governments, professional associations, trade unions and researchers – attempt to regulate the migration of nurses from the poorer regions of the world under the guise of an ‘ethical recruitment’ framework. Drawing from previous chapters, I problematise the concept of the brain drain phenomenon with specific reference to the experience of the Philippines as a source country
CHARACTERIZATION OF CRYSTALLINE PIGMENTS WITH LOW-FREQUENCY VIBRATIONAL SPECTROSCOPY AND SOLID-STATE DENSITY FUNCTIONAL THEORY
Although historical pigments are seldom found in the modern artist’s palette, their characterization is a critical aspect of designing effective conservation and restoration protocols, establishing provenance, and detecting forgeries. Ideal characterization methods are nondestructive, noninvasive, and able to distinguish between pure and mixed pigment samples. Spectroscopic techniques are commonly used to identify pigment composition because of their non-ionizing nature, rapid acquisition times, and safety. Unfortunately, the majority of these methods have difficulty distinguishing between pigments with similar chemical and physical properties. Recent advancements in instrument technology have increased the broader availability of terahertz time-domain spectroscopy (THz-TDS) and low-frequency Raman spectroscopy (LFRS). In this work, the capabilities of THz-TDS and LFRS for identification and characterization of historic and modern pigments were evaluated. These experimental studies were supported with solid-state density functional theory (ss-DFT) simulations of the pigment structures and vibrations to gain insight into the molecular and intermolecular origins of the observed spectral features. These results demonstrate the powerful combination of low-frequency (≤ 200 cm-1) vibrational spectroscopic methods and computational techniques for the identification and characterization of pigments and establish the compelling abilities of THz-TDS and LFRS as new tools for characterization of pigment components in artworks and artifacts
Protected Area Governance and Management
Protected Area Governance and Management presents a compendium of original text, case studies and examples from across the world, by drawing on the literature, and on the knowledge and experience of those involved in protected areas. The book synthesises current knowledge and cutting-edge thinking from the diverse branches of practice and learning relevant to protected area governance and management. It is intended as an investment in the skills and competencies of people and consequently, the effective governance and management of protected areas for which they are responsible, now and into the future. The global success of the protected area concept lies in its shared vision to protect natural and cultural heritage for the long term, and organisations such as International Union for the Conservation of Nature are a unifying force in this regard. Nonetheless, protected areas are a socio-political phenomenon and the ways that nations understand, govern and manage them is always open to contest and debate. The book aims to enlighten, educate and above all to challenge readers to think deeply about protected areas—their future and their past, as well as their present
- …