Addressing Cyber Security Accessibility: A Qualitative Study
<p dir="ltr">This short paper highlights the experience of victims of social engineering attacks and their accessibility to cybersecurity mechanisms. Current research has mainly focused on technical and digital literacy in curbing cyber-attacks which leaves out users with little or n...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , |
| Published: |
2021
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1864513511324909568 |
|---|---|
| author | Bilikis Banire (14158833) |
| author2 | Dena Al Thani (14149995) Yin Yang (35103) |
| author2_role | author author |
| author_facet | Bilikis Banire (14158833) Dena Al Thani (14149995) Yin Yang (35103) |
| author_role | author |
| dc.creator.none.fl_str_mv | Bilikis Banire (14158833) Dena Al Thani (14149995) Yin Yang (35103) |
| dc.date.none.fl_str_mv | 2021-07-01T00:00:00Z |
| dc.identifier.none.fl_str_mv | 10.14236/ewic/hci2021-w5.2 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/conference_contribution/Addressing_Cyber_Security_Accessibility_A_Qualitative_Study/26015758 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Information and computing sciences Cybersecurity and privacy Human-centred computing cyber-attack methods cyber security social engineering accessibility grounded theory |
| dc.title.none.fl_str_mv | Addressing Cyber Security Accessibility: A Qualitative Study |
| dc.type.none.fl_str_mv | Text Conference contribution info:eu-repo/semantics/publishedVersion text conference object |
| description | <p dir="ltr">This short paper highlights the experience of victims of social engineering attacks and their accessibility to cybersecurity mechanisms. Current research has mainly focused on technical and digital literacy in curbing cyber-attacks which leaves out users with little or no technical ability in recognizing cyber-attacks. The experiences of 17 victims of social engineering attacks are sought using semi-structured interviews. The analysis of the interview data was done using grounded theory, and two main categories relevant to social engineering methods and accessible cybersecurity mechanisms were identified. Finally, this paper presents important recommendations on cybersecurity mechanisms that are accessible to users with little or no digital literacy.</p><h2>Other Information</h2><p dir="ltr">Published in: Electronic Workshops in Computing<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See conference contribution on publisher's website: <a href="https://dx.doi.org/10.14236/ewic/hci2021-w5.2" target="_blank">https://dx.doi.org/10.14236/ewic/hci2021-w5.2</a></p><p dir="ltr">See conference workshops programme: <a href="https://hci2021.bcs.org/workshops" target="_blank">https://hci2021.bcs.org/workshops</a></p><p dir="ltr">Conference name: 34th British HCI Workshop and Doctoral Consortium : Post-pandemic HCI – Living Digitally, 20th - 21st July 2021, London - UK</p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_6de8c8337e20bbc0697ceae2ff19dd2e |
| identifier_str_mv | 10.14236/ewic/hci2021-w5.2 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/26015758 |
| publishDate | 2021 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Addressing Cyber Security Accessibility: A Qualitative StudyBilikis Banire (14158833)Dena Al Thani (14149995)Yin Yang (35103)Information and computing sciencesCybersecurity and privacyHuman-centred computingcyber-attack methodscyber securitysocial engineeringaccessibilitygrounded theory<p dir="ltr">This short paper highlights the experience of victims of social engineering attacks and their accessibility to cybersecurity mechanisms. Current research has mainly focused on technical and digital literacy in curbing cyber-attacks which leaves out users with little or no technical ability in recognizing cyber-attacks. The experiences of 17 victims of social engineering attacks are sought using semi-structured interviews. The analysis of the interview data was done using grounded theory, and two main categories relevant to social engineering methods and accessible cybersecurity mechanisms were identified. Finally, this paper presents important recommendations on cybersecurity mechanisms that are accessible to users with little or no digital literacy.</p><h2>Other Information</h2><p dir="ltr">Published in: Electronic Workshops in Computing<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See conference contribution on publisher's website: <a href="https://dx.doi.org/10.14236/ewic/hci2021-w5.2" target="_blank">https://dx.doi.org/10.14236/ewic/hci2021-w5.2</a></p><p dir="ltr">See conference workshops programme: <a href="https://hci2021.bcs.org/workshops" target="_blank">https://hci2021.bcs.org/workshops</a></p><p dir="ltr">Conference name: 34th British HCI Workshop and Doctoral Consortium : Post-pandemic HCI – Living Digitally, 20th - 21st July 2021, London - UK</p>2021-07-01T00:00:00ZTextConference contributioninfo:eu-repo/semantics/publishedVersiontextconference object10.14236/ewic/hci2021-w5.2https://figshare.com/articles/conference_contribution/Addressing_Cyber_Security_Accessibility_A_Qualitative_Study/26015758CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/260157582021-07-01T00:00:00Z |
| spellingShingle | Addressing Cyber Security Accessibility: A Qualitative Study Bilikis Banire (14158833) Information and computing sciences Cybersecurity and privacy Human-centred computing cyber-attack methods cyber security social engineering accessibility grounded theory |
| status_str | publishedVersion |
| title | Addressing Cyber Security Accessibility: A Qualitative Study |
| title_full | Addressing Cyber Security Accessibility: A Qualitative Study |
| title_fullStr | Addressing Cyber Security Accessibility: A Qualitative Study |
| title_full_unstemmed | Addressing Cyber Security Accessibility: A Qualitative Study |
| title_short | Addressing Cyber Security Accessibility: A Qualitative Study |
| title_sort | Addressing Cyber Security Accessibility: A Qualitative Study |
| topic | Information and computing sciences Cybersecurity and privacy Human-centred computing cyber-attack methods cyber security social engineering accessibility grounded theory |