Remembrance of Data Passed: A Study of Disk Sanitization Practices
IEEE Security and Privacy
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Looking for trouble: understanding end-user security management
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
User Perceptions of Security Technologies
International Journal of Information Security and Privacy
UAHCI'13 Proceedings of the 7th international conference on Universal Access in Human-Computer Interaction: design methods, tools, and interaction techniques for eInclusion - Volume Part I
Hi-index | 0.00 |
End users are typically seen as the weakest link in ensuring security and privacy in computing environments. Our own prior work suggested that end users may have difficulty differentiating between privacy/security problems and other hardware/software concerns. However, a survey of a broad group of internet users showed that, in fact, these users believe that they can not only differentiate between these two sets of concerns, but that in fact users are more concerned with security/privacy concerns than they are with other types of computer problems.