Understanding User’s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account

نویسندگان

چکیده

A wide-range of personal and sensitive information are stored in users’ online accounts. Losing access, or an unauthorized access to one those accounts could put them into the risks privacy breach, cause financial loss, compromise their accessibility important documents. large body prior work focused on developing new schemes strategies protect security. However, there is a dearth existing literature understand contingency plans once they lose identify We addressed this gap our work, where we conducted semi-structured interview with 59 participants from three different countries: Bangladesh, Turkey, USA. Our findings reveal unawareness, misconceptions, concerns users, which refrain taking security-preserving steps also identified prevention that security further risks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a framework for identifying and prioritizing factors affecting customers’ online shopping behavior in iran

the purpose of this study is identifying effective factors which make customers shop online in iran and investigating the importance of discovered factors in online customers’ decision. in the identifying phase, to discover the factors affecting online shopping behavior of customers in iran, the derived reference model summarizing antecedents of online shopping proposed by change et al. was us...

15 صفحه اول

Protecting Online Documents from an Unauthorized External Access (in Bulgarian)

The modern multi-tier web applications and information systems store and process various types of data. Some of them are stored in a database, controlled by an external database management system, while other data are stored directly within the server’s file system. The database is secured by the database management system itself, but it is a programmer’s responsibility to design and develop a ...

متن کامل

Identifying Users across Multiple Online Social Networks

An online user joins multiple social networks in order to enjoy different services. On each joined social network, she creates an identity and constitutes its three major dimensions namely profile, content and connection network. She largely governs her identity formulation on any social network and therefore can manipulate multiple aspects of it. With no global identifier to mark her presence ...

متن کامل

Analysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks

Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...

متن کامل

Recommendation in Persuasive eHealth Systems: an Effective Strategy to Spot Users' Losing Motivation to Exercise

Persuasive health technologies in the sport domain focus mostly on motivating and supporting people in reaching an active lifestyle. In this paper, we exploit a real-world dataset made available by a commercial persuasive ecosystem called u4fit. u4fit allows coaches to create tailored workout plans and to constantly monitor and support their sportsmen remotely. Occasional sportsmen often and su...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-77392-2_20