Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Social psychology: An under-used tool in cybersecurity
In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and advance...
What impact does human behavior have on cyber security?
This article outlines the importance of human behaviour when it comes to cyber security and offers some recommendations to help create a stronger ‘human firewall’.
Nudging better security
This article explains what ‘behavioural nudging’ is and offers examples of how nudging could be used to encourage desired security behaviours.
Towards a usable framework for modelling security and privacy risks in the smart home
The Internet-of-Things (IoT) ushers in a new age where the variety and amount of connected, smart devices present in the home is set to increase substantially. While these bring several advantages in terms of convenience and assisted living, security and privacy risks...
Productive security: A scalable methodology for analysing employee security behaviours
Organisational security policies are often written without sufficiently taking in to account the goals and capabilities of the employees that must follow them. Effective security management requires that security managers are able to assess the effectiveness of their...
Keep on lockin’ in the free world: A multi-national comparison of smartphone locking
We present the results of an online survey of smartphone unlocking (N = 8, 286) that we conducted in eight different countries. The goal was to investigate differences in attitudes towards smartphone unlocking between different national cultures. Our results show that...
Security dialogues: Building better relationships between security and business
The “streetlight effect”—originally less flatteringly referred to as the “drunkard’s search”—is a form of observational bias. It recognizes our tendency to look for solutions to problems where it’s easiest to find them, such as under a streetlight. In this article, we...
Tales of software updates: The process of updating software
This paper delves into the process users undergo when updating their software, including both the positive and negative experiences they encounter. Software updates, which can alter functionality by fixing bugs, changing features, and modifying the user interface, can...
How can you improve cyber security awareness in your organisation?
A short blog post on how the gamification of cyber security awareness campaigns can raise cyber security awareness and change organisational culture.
How to combat insider threat using behavioral science
Understanding human behaviour – and noticing an individual's deviation from an expected behaviour – can help prevent and mitigate insider threats.
The Internet of Things – An introduction to privacy issues with a focus on the retail and home environments
This research paper provides an overview of the Internet of Things technologies generally, and with special application in the retail and home context. It then goes on to examine some of the challenges that this new environment creates through the lens of specific...
Human behaviour as an aspect of cyber security assurance
This paper considers existing research into cyber security assurance processes in an effort to identify elements of cyber security that would benefit from further research and development. It concludes the cyber security industry would benefit from more research into...
Why Johnny still, still can’t encrypt: Evaluating the usability of a modern PGP client
This paper presents the results of a laboratory study involving Mailvelope, a modern PGP client that integrates tightly with existing webmail providers. In our study, we brought in pairs of participants and had them attempt to use Mailvelope to communicate with each...
Nudging online security behaviour with warning messages
Researchers tested the effectiveness of 9 different ways of warning users about cyber security threats. Making users aware of the steps they could take to minimise risk was effective in triggering more secure behaviour. Gain-framed messages, loss-framed messages and a...
A study on social engineering attacks and defence mechanisms
Humans are the most vulnerable points in any kind of security system because of their predictable behaviour and other psychological aspects. Yet, a lot of emphasis related to security is given to implementation of technical security via an antivirus, Intrusion...
Evaluating behaviour changed in international development operations: A new framework
On behalf of the World Bank, this paper's authors develop a tool to evaluate behaviour change interventions in the development sector. The tool can be used to assess the prevalence and integration of behaviour change concepts into the life cycle of a behaviour change...
“What can I really do?” Explaining the privacy paradox with online apathy
Based on focus group interviews, we considered how young adults’ attitudes about privacy can be reconciled with their online behavior. The “privacy paradox” suggests that young people claim to care about privacy while simultaneously providing a great deal of personal...
Data integrity attacks and defenses for Intel lab sensor network
Wireless sensor networks have been increasingly popular and they have been deployed in a wide range of areas including transportation system, healthcare, robotics, and smart home. Wireless sensor networks have facilitated our life using the remote sensing ability....
Awareness is only the first step
Improving cyber security awareness is often assumed to improve cyber security, however this paper suggests it's necessary for people to be engaged in cyber security in order to make people a robust cyber defence. The paper builds a model for engaging people in cyber...
Password security: An empirical study
One of the most common control mechanisms for authenticating users of computerized information systems is the use of passwords. Despite the widespread use of passwords, little attention has been given to the characteristics of their actual use. This paper addresses...
Online privacy tools for the general public
Taking into account the increasing need for online data protection and the availability of numerous Privacy Enhancing Technologies (PETs) for internet and mobile users, ENISA conducted, under its 2015 work programme, a study on online privacy tools, aiming at...