Communications of the ACM
Users' conceptions of risks and harms on the web: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Humans in the Loop: Human-Computer Interaction and Security
IEEE Security and Privacy
Do privacy seals in e-commerce really work?
Communications of the ACM - Mobile computing opportunities and challenges
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Building security and trust in online banking
CHI '05 Extended Abstracts on Human Factors in Computing Systems
The user non-acceptance paradigm: INFOSEC's dirty little secret
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Two experiences designing for effective security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Usable security and privacy: a case study of developing privacy management tools
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
To download or not to download: an examination of computer security decision making
interactions - A contradiction in terms?
Is usable security an oxymoron?
interactions - A contradiction in terms?
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Looking for trouble: understanding end-user security management
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Password sharing: implications for security design based on social practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
An honest man has nothing to fear: user perceptions on web-based information disclosure
Proceedings of the 3rd symposium on Usable privacy and security
End user concern about security and privacy threats
Proceedings of the 3rd symposium on Usable privacy and security
Hi-index | 0.00 |
In this paper, user perceptions of information systems security are explored through a study of university students. Server authentication, which is often ignored by users, clouded by system administrators, and exploited by hackers, is explored in detail, as it significantly affects usability and requires user knowledge and participation. The study also investigates the respondents' consistency, gender differences, and assessment of their own knowledge. Although users appear knowledgeable about security technologies, they rely more on peer opinion and reputation of web sites when making security decisions.