Basing Cybersecurity Training on User Perceptions

The authors investigated users' understanding of online security by conducting in-depth interviews to identify correct perceptions, myths, and potential misperceptions. Participants were aware of and concerned with online and computer security but lacked a complete skill set to protect their computer systems, identities, and information online.

[1]  Mary Beth Rosson,et al.  Looking for trouble: understanding end-user security management , 2007, CHIMIT '07.

[2]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[3]  P. Pavlou,et al.  Perceived Information Security, Financial Liability and Consumer Trust in Electronic Commerce Transactions , 2002 .

[4]  Dan Jong Kim,et al.  Revisiting the role of web assurance seals in consumer trust , 2004, ICEC '04.

[5]  Ken Bain,et al.  What the Best College Teachers Do , 2004 .

[6]  Daniel Kahneman,et al.  Availability: A heuristic for judging frequency and probability , 1973 .

[7]  Christian End,et al.  Unrealistic optimism in internet events , 2007, Comput. Hum. Behav..

[8]  L. Jean Camp,et al.  Mental Models of Computer Security Risks , 2007, WEIS.

[9]  D. Gentner,et al.  Cultural models in language and thought: How people construct mental models , 1987 .

[10]  Alan J. Dubinsky,et al.  Effect of brand name on consumers' risk perceptions of online shopping , 2004 .

[11]  Rick Wash,et al.  Organization Interfaces—collaborative computing General Terms , 2022 .

[12]  Paul Kearney,et al.  Human vulnerabilities in security systems , 2007 .

[13]  David M. Szymanski,et al.  E-satisfaction: an initial examination , 2000 .

[14]  J. Hardy What the Best College Teachers Do , 2007 .

[15]  Scott Flinn,et al.  User Perceptions of Privacy and Security on the Web , 2005, PST.