Understanding User’s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account
نویسندگان
چکیده
A wide-range of personal and sensitive information are stored in users’ online accounts. Losing access, or an unauthorized access to one those accounts could put them into the risks privacy breach, cause financial loss, compromise their accessibility important documents. large body prior work focused on developing new schemes strategies protect security. However, there is a dearth existing literature understand contingency plans once they lose identify We addressed this gap our work, where we conducted semi-structured interview with 59 participants from three different countries: Bangladesh, Turkey, USA. Our findings reveal unawareness, misconceptions, concerns users, which refrain taking security-preserving steps also identified prevention that security further risks.
منابع مشابه
a framework for identifying and prioritizing factors affecting customers’ online shopping behavior in iran
the purpose of this study is identifying effective factors which make customers shop online in iran and investigating the importance of discovered factors in online customers’ decision. in the identifying phase, to discover the factors affecting online shopping behavior of customers in iran, the derived reference model summarizing antecedents of online shopping proposed by change et al. was us...
15 صفحه اولProtecting Online Documents from an Unauthorized External Access (in Bulgarian)
The modern multi-tier web applications and information systems store and process various types of data. Some of them are stored in a database, controlled by an external database management system, while other data are stored directly within the server’s file system. The database is secured by the database management system itself, but it is a programmer’s responsibility to design and develop a ...
متن کاملIdentifying Users across Multiple Online Social Networks
An online user joins multiple social networks in order to enjoy different services. On each joined social network, she creates an identity and constitutes its three major dimensions namely profile, content and connection network. She largely governs her identity formulation on any social network and therefore can manipulate multiple aspects of it. With no global identifier to mark her presence ...
متن کاملAnalysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks
Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...
متن کاملRecommendation in Persuasive eHealth Systems: an Effective Strategy to Spot Users' Losing Motivation to Exercise
Persuasive health technologies in the sport domain focus mostly on motivating and supporting people in reaching an active lifestyle. In this paper, we exploit a real-world dataset made available by a commercial persuasive ecosystem called u4fit. u4fit allows coaches to create tailored workout plans and to constantly monitor and support their sportsmen remotely. Occasional sportsmen often and su...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-77392-2_20