- Anderson, R. and Moore, T. The economics of information security. Science 314, (2006), 610--613.Google ScholarCross Ref
- August, T. and Tunca, T. Network software security and user incentives. Management Science 52 (2006), 1703--1720. Google ScholarDigital Library
- August, T. and Tunca, T. Who should be responsible for software security? A comparative analysis of liability policies in network environments. Management Science 57 (2011), 934--959. Google ScholarDigital Library
- Department of Defense, Department of Defense Strategy for Operating in Cyberspace (2011); http://www.defense.gov/news/d20110714cyber.pdf.Google Scholar
- Espiner, T. EC wants software makers held liable for code. ZDNet (2009).Google Scholar
- Heckman, C. Two views on security software liability: Using the right legal tools. IEEE Security & Privacy 1, (2003), 73--75. Google ScholarDigital Library
- Moore, D., Shannon, C., and Brown, J. Code-Red: A case study on the spread and victims of an Internet worm. In Proceedings of the ACM SIGCOMM/USENIX Internet Measurement Workshop (2002), 273--284. Google ScholarDigital Library
- National Science Foundation. Secure and Trustworthy Cyberspace (SaTC) Program Solicitation NSF 12-596 (2012); www.nsf.gov/pubs/2012/nsf12596/nsf12596.pdf.Google Scholar
- Obama, B. Executive Order---Improving Critical Infrastructure Cybersecurity. The White House, Office of the Press Secretary, Washington, D.C., 2013.Google Scholar
- Ryan, D. Two views on security software liability: Let the legal system decide. IEEE Security & Privacy 1, (2003), 70--72. Google ScholarDigital Library
- Satter, R. ACLU: Slow smartphone updates are privacy threat. Associated Press (2013).Google Scholar
- Yang, J. Smartphones in use surpass 1 billion, will double by 2015. Bloomberg (2012).Google Scholar
Index Terms
- Designing user incentives for cybersecurity
Recommendations
Designing for the secondary user experience
INTERACT'11: Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IVComputer systems are first and foremost designed for primary users. The needs of the other types of users, such as secondary users, are often overlooked. These users are not interacting with the system directly but are yet affected by it. This study is ...
Malicious User Experience Design Research for Cybersecurity
NSPW '18: Proceedings of the New Security Paradigms WorkshopThis paper explores the factors and theory behind the user-centered research necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context. We explore what is known about successful addictive ...
Comments