Even if users do not read security directives, their behavior is not so catastrophic.
Vashek MatyasKamil MalinkaLydia KrausLenka KnapovaAgata KruzikovaPublished in: Commun. ACM (2022)
Keyphrases
- user interface
- end users
- recommender systems
- information security
- multiple users
- user interaction
- intrusion detection
- information seeking
- malicious users
- personal data
- security policies
- daily life
- access control
- website
- user experience
- user groups
- user profiles
- computer security
- answer questions
- user activity
- security risks
- access control mechanism
- information leakage
- social media
- behave differently