Search results
1 – 5 of 5Sanchari Das, Christena Nippert-Eng and L. Jean Camp
Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses risks to businesses, government agencies and all users due to sensitive data…
Abstract
Purpose
Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses risks to businesses, government agencies and all users due to sensitive data breaches and subsequent financial losses. To study the user side, this paper aims to conduct a literature review and user study.
Design/methodology/approach
To investigate phishing attacks, the authors provide a detailed overview of previous research on phishing techniques by conducting a systematic literature review of n = 367 peer-reviewed academic papers published in ACM Digital Library. Also, the authors report on an evaluation of a high school community. The authors engaged 57 high school students and faculty members (12 high school students, 45 staff members) as participants in research using signal detection theory (SDT).
Findings
Through the literature review which goes back to as early as 2004, the authors found that only 13.9% of papers focused on user studies. In the user study, through scenario-based analysis, participants were tasked with distinguishing phishing e-mails from authentic e-mails. The results revealed an overconfidence bias in self-detection from the participants, regardless of their technical background.
Originality/value
The authors conducted a literature review with a focus on user study which is a first in this field as far the authors know. Additionally, the authors conducted a detailed user study with high school students and faculty using SDT which is also an understudied area and population.
Details
Keywords
Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das and L. Jean Camp
The purpose of this paper is to propose practical and usable interactions that will allow more informed, risk-aware comparisons for individuals during app selections. The authors…
Abstract
Purpose
The purpose of this paper is to propose practical and usable interactions that will allow more informed, risk-aware comparisons for individuals during app selections. The authors include an explicit argument for the role of human decision-making during app selection and close with a discussion of the strengths of a Bayesian approach to evaluating privacy and security interventions.
Design/methodology/approach
The authors focused on the risk communication in mobile marketplace’s realm, examining how risk indicators can help people choose more secure and privacy-preserving apps. Combining canonical findings in risk perception with previous work in usable security, the authors designed indicators for each app to enable decisions that prioritize risk avoidance. Specifically, the authors performed a natural experiment with N = 60 participants, where they asked them to select applications on Android tablets with accurate real-time marketplace data.
Findings
In the aggregate, the authors found that app selections changed to be more risk-averse in the presence of a user-centered multi-level warning system using visual indicators that enabled a click-thru to the more detailed risk and permissions information.
Originality/value
Privacy research in the laboratory is often in conflict with privacy decision-making in the marketplace, resulting in a privacy paradox. To better understand this, the authors implemented a research design based on clinical experimental approaches, testing the interaction in a noisy, confounded field environment.
Details
Keywords
Sanchari Bhattacharyya and Reena Sanasam
The visible ill-effects of the developmental enterprises in the ex-colonies and the tendency towards technocratic totalitarianism, in many ways, have altered the way modern humans…
Abstract
Purpose
The visible ill-effects of the developmental enterprises in the ex-colonies and the tendency towards technocratic totalitarianism, in many ways, have altered the way modern humans perceived the idea of “progress” and “development” historically since the Cold War. This paper presents a deconstructive-transdisciplinary critique of the pervasive ideology by focusing on three nodal points in the stages of “development”: (1) the rise of technocratic modern science; (2) the making of the Third World; and (3) de-legitimisation of its indigenous knowledge paradigms.
Design/methodology/approach
Drawing on the first-hand accounts of the researchers, social scientists, activists and environmentalists, this paper presents an extensive critique of the violence involved in the development enterprises and recommends possible ways to move beyond the developmental hegemony. This paper is a theoretical investigation that adopts an interpretative, pluralistic, transdisciplinary approach, in order to deconstruct the development ideology and analyse the ramifications of the developmental propaganda and practice as they unfolded in the Global South.
Findings
This paper highlights the need to decondition the social imaginary from the hegemony of developmentalism and its by-product scientism and “technological rationality” for an inclusive, pluralistic, democratic social order.
Research limitations/implications
The focal area of this work is India in particular and Global South in general. It studies the era between the 1950s and 1980s when the major development enterprises took place and studies the consequences they entailed.
Social implications
The scope of this paper encompasses every socio-economic, ecological and epistemological domain affected by the detrimental effects of the developmental enterprises in the Global South.
Originality/value
The originality of this work lies in its transdisciplinary approach. The scope of this paper is extensive and covers nearly every domain of human existence that has been affected by the development debacle and technocratic totalitarianism in the post-War era.
Details
Keywords