Lifestreams: a storage model for personal data
ACM SIGMOD Record
Security and Privacy Requirements Analysis within a Social Setting
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
Looking at, looking up or keeping up with people?: motives and use of facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Understanding privacy settings in facebook with an audience view
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Future consumer mobile phone security: A case study using the data-centric security model
Information Security Tech. Report
All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Proceedings of the 2009 ACM symposium on Applied Computing
FaceCloak: An Architecture for User Privacy on Social Networking Sites
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
Nudging Privacy: The Behavioral Economics of Personal Information
IEEE Security and Privacy
So long, and no thanks for the externalities: the rational rejection of security advice by users
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Crying wolf: an empirical study of SSL warning effectiveness
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Hi-index | 0.00 |
Simply by using information technology, consumers expose themselves to considerable security risks. Because no technical or legal solutions are readily available, and awareness programs have limited impact, the only remedy is to develop a risk management process for consumers. Consumers need to understand the IT risks they face, and decide how to deal with them in an iterative and structured manner: implement technical mitigations, alter their behavior or simply accept the risks. Such a process is feasible: enterprises already execute such processes, and time-saving tools can support the consumer in her own process. In fact, given our society's emphasis on individual responsibilities, skills and devices, a risk management process for consumers is the logical next step in improving information security information security.