An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given)

An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given)

[1]  Melanie Volkamer,et al.  NoPhish: An Anti-Phishing Education App , 2014, STM.

[2]  Konstantin Beznosov,et al.  Understanding Users' Requirements for Data Protection in Smartphones , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.

[3]  Matthew Smith,et al.  Using personal examples to improve risk communication for security & privacy decisions , 2014, CHI.

[4]  Steven Furnell,et al.  From desktop to mobile: Examining the security experience , 2009, Comput. Secur..

[5]  N D Weinstein,et al.  Why it won't happen to me: perceptions of risk factors and susceptibility. , 1984, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[6]  M. Angela Sasse,et al.  Desperately seeking assurances: Segmenting users by their information-seeking preferences , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.

[7]  A. Akande,et al.  Black South African Adolescents' Attitudes Towards AIDS Precautions , 1997 .

[8]  S. Furnell,et al.  Public awareness and perceptions of biometrics , 2007 .

[9]  Angela Sasse,et al.  Humans in the Loop Human – Computer Interaction and Security , 2022 .

[10]  S. Liu,et al.  A practical guide to biometric security technology , 2001 .

[11]  Ivan Flechais Usable Security: What Is It? How Do We Get It? , 2005 .

[12]  M. Angela Sasse,et al.  Pretty good persuasion: a first step towards effective password security in the real world , 2001, NSPW '01.

[13]  David A. Wagner,et al.  Are You Ready to Lock? , 2014, CCS.

[14]  Nick Mathewson,et al.  Anonymity Loves Company: Usability and the Network Effect , 2006, WEIS.

[15]  Edward W. Felten,et al.  Secrecy, flagging, and paranoia: adoption criteria in encrypted email , 2006, CHI.

[16]  Melanie Volkamer,et al.  Why Doesn't Jane Protect Her Privacy? , 2014, Privacy Enhancing Technologies.

[17]  Andra Giurgiu,et al.  No Place to Hide – Edward Snowden, the NSA and the Surveillance State , 2015 .

[18]  Lorrie Faith Cranor,et al.  A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.

[19]  Bruce Schneier,et al.  The psychology of security , 2007, CACM.

[20]  Eirik Albrechtsen,et al.  A qualitative study of users' view on information security , 2007, Comput. Secur..

[21]  Matthew Smith,et al.  Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.

[22]  Matthew Smith,et al.  On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards , 2013, Privacy Enhancing Technologies.

[23]  Steven Furnell,et al.  Security beliefs and barriers for novice Internet users , 2008, Comput. Secur..

[24]  Butler W. Lampson Privacy and securityUsable security , 2009, Commun. ACM.

[25]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[26]  Matt Blaze,et al.  Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System , 2011, USENIX Security Symposium.

[27]  Mark Robinson,et al.  Exploring end-user smartphone security awareness within a South African context , 2014, 2014 Information Security for South Africa.

[28]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[29]  Amir Herzberg Why Johnny can't surf (safely)? Attacks and defenses for web users , 2009, Comput. Secur..

[30]  Thomas R. Kochtanek,et al.  Success Factors in the Implementation of a Collaborative Technology, and Resulting Productivity Improvements in a Small Business: An Exploratory Study , 2004, J. Organ. End User Comput..

[31]  P. Corrigan,et al.  At issue: Stop the stigma: call mental illness a brain disease. , 2004, Schizophrenia bulletin.

[32]  Sebastian Günther Folk Models of Home Computer Security , 2012 .

[33]  Marco R. Spruit,et al.  Information Security in Health Care - Evaluation with Health Professionals , 2011, HEALTHINF.

[34]  Melanie Volkamer,et al.  What Deters Jane from Preventing Identification and Tracking on the Web? , 2014, WPES.

[35]  George R. S. Weir,et al.  Perceived risk and sensitive data on mobile devices , 2011 .

[36]  David A. Wagner,et al.  I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.

[37]  Vyas Sekar,et al.  Measuring user confidence in smartphone security and privacy , 2012, SOUPS.

[38]  Alexander De Luca,et al.  It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception , 2014, SOUPS.

[39]  Tejaswini Herath,et al.  Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..

[40]  Daniel J. Solove 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .

[41]  Alastair R. Beresford,et al.  MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.

[42]  Ramakrishnan Raman,et al.  A Study on the User Perception and Awareness of Smartphone Security , 2014 .

[43]  Bernhard Debatin,et al.  Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..