Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings

Cybersecurity suffers from the problem of poor incident reporting. We explored message influences on incident reporting rate. Participants were presented with messages that differed in terms of (i) whether the problem was framed as a technical or a security issue and (ii) the perceived beneficiaries of making a report (benefit to the user, to others vs. no benefit message). Participants were more likely to report a problem if so doing implied some benefit to self, where making the problem more personally relevant might act to reduce social loafing in group settings. They were also more likely to report a technical rather than a security problem and qualitative data suggested that users were sometimes suspicious of messages reporting a security incident – believing that the message itself might be a cybersecurity attack. The findings provide starting points for future research aimed at improving incident reporting.

[1]  Ping Yan,et al.  Biometric Recognition Using 3D Ear Shape , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  Fabio Roli,et al.  Fusion of multiple clues for photo-attack detection in face recognition systems , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[3]  Kathy Buckner,et al.  Culture & biometrics: regional differences in the perception of biometric authentication technologies , 2009, AI & SOCIETY.

[4]  Shujun Li,et al.  Breaking undercover: exploiting design flaws and nonuniform human behavior , 2011, SOUPS.

[5]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[6]  Richard M. Guest,et al.  Predicting sex as a soft-biometrics from device interaction swipe gestures , 2016, Pattern Recognit. Lett..

[7]  Gary M. Weiss,et al.  Activity recognition using cell phone accelerometers , 2011, SKDD.

[8]  Tieniu Tan,et al.  Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.

[9]  Jun Han,et al.  ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.

[10]  Rick Wash,et al.  Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites , 2016, SOUPS.

[11]  Rana Tassabehji,et al.  Improving E-Banking Security with Biometrics: Modelling User Attitudes and Acceptance , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[12]  Kenichi Yamazaki,et al.  Gait analyzer based on a cell phone with a single three-axis accelerometer , 2006, Mobile HCI.

[13]  Dario D. Salvucci Predicting the effects of in-car interfaces on driver behavior using a cognitive architecture , 2001, CHI.

[14]  Josef Bigün,et al.  Real-Time Face Detection and Motion Analysis With Application in “Liveness” Assessment , 2007, IEEE Transactions on Information Forensics and Security.

[15]  Daisuke Miyamoto,et al.  Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification , 2015, ICONIP.

[16]  Timothy F. Cootes,et al.  An Automatic Face Identification System Using Flexible Appearance Models , 1994, BMVC.

[17]  Shari Trewin,et al.  Biometric authentication on a mobile device: a study of user effort, error and task disruption , 2012, ACSAC '12.

[18]  Lin Sun,et al.  Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[19]  Hao Chen,et al.  TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.

[20]  Luis A. Hernández Gómez,et al.  Usability evaluation of multi-modal biometric verification systems , 2006, Interact. Comput..

[21]  R. Sun,et al.  The interaction of the explicit and the implicit in skill learning: a dual-process approach. , 2005, Psychological review.

[22]  Jerome H. Saltzer,et al.  Kerberos authentication and authorization system , 1987 .

[23]  Paul Jones,et al.  Secrets and Lies: Digital Security in a Networked World , 2002 .

[24]  Hong Li,et al.  A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[25]  Rajesh P. N. Rao,et al.  Eye movements in iconic visual search , 2002, Vision Research.

[26]  Matti Pietikäinen,et al.  Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[27]  Sebastian Möller,et al.  Gender differences in the perception of security of mobile phones , 2012, Mobile HCI.

[28]  Nicolas Christin,et al.  Undercover: authentication usable in front of prying eyes , 2008, CHI.

[29]  Elizabeth Stobert,et al.  Memory retrieval and graphical passwords , 2013, SOUPS.

[30]  John E. Laird,et al.  The Soar Cognitive Architecture , 2012 .

[31]  A. Ant Ozok,et al.  A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.

[32]  Celeste Lyn Paul,et al.  A Field Study of User Behavior and Perceptions in Smartcard Authentication , 2011, INTERACT.

[33]  Matti Pietikäinen,et al.  Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[34]  Alexander De Luca,et al.  PassShapes: utilizing stroke based authentication to increase password memorability , 2008, NordiCHI.

[35]  Jennifer A. Safar,et al.  The Effects of use on Acceptance and Trust in Voice Authentication Technology , 2006 .

[36]  Hua Yu,et al.  A direct LDA algorithm for high-dimensional data - with application to face recognition , 2001, Pattern Recognit..

[37]  Jan Palczewski,et al.  Monte Carlo Simulation , 2008, Encyclopedia of GIS.

[38]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[39]  Ákos Frohner,et al.  VOMS, an Authorization System for Virtual Organizations , 2003, European Across Grids Conference.

[40]  Heinrich Hußmann,et al.  Making graphic-based authentication secure against smudge attacks , 2013, IUI '13.

[41]  Yasser M. Hausawi,et al.  Secure, Usable Biometric Authentication Systems , 2013, HCI.

[42]  Josef Bigün,et al.  Evaluating liveness by face images and the structure tensor , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[43]  Seongbeak Yoon,et al.  Masked fake face detection using radiance measurements. , 2009, Journal of the Optical Society of America. A, Optics, image science, and vision.

[44]  Ma Sasse,et al.  Usability and Trust in Information Systems , 2005 .

[45]  Chris Bevan,et al.  Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures , 2016, Int. J. Hum. Comput. Stud..

[46]  D. Scheuermann,et al.  Usability of Biometrics in Relation to Electronic Signatures , 2000 .

[47]  Kat Krol,et al.  The Great Authentication Fatigue - And How to Overcome It , 2014, HCI.