Learn More
Few users have a single, authoritative, source from whom they can request digital-security advice. Rather, digital-security skills are often learned haphazardly, as users filter through an overwhelming quantity of security advice. By understanding the factors that contribute to users' advice sources, beliefs, and security behaviors, we can help to pare down(More)
Users receive a multitude of digital-and physical-security advice every day. Indeed, if we implemented all the security advice we received, we would never leave our houses or use the Internet. Instead, users selectively choose some advice to accept and some (most) to reject, however, it is unclear whether they are effectively prioritizing what is most(More)
Mentors-protégé relationships have been shown to improve retention of women and under-represented students in computing (Cohoon, 2011). Mentorship relationships are also the driving factor in female students' selection and completion of a computing career (Ashcraft, Eger, & Friend, 2012). More generally, mentor-protégé relationships(More)
International development banks provide low-interest loans to developing countries in an effort to stimulate social and economic development. These loans support key infrastructure projects including the building of roads, schools, and hospitals. However, despite the best efforts of development banks, these loan funds are often lost to fraud, corruption,(More)
Security messages that ask users to adopt new behaviors can be a crucial aspect of users’ security decision-making. Prior work has focused extensively on how to design warning messages to discourage insecure practices. In this work, we instead examine how to design motivating security messages to encourage adoption, taking two-factor authentication (2FA) as(More)
Users often struggle to stay digitally secure. Despite a multitude of security advice, they find it challenging to identify threats and develop appropriate behaviors to prevent potential attacks, especially in complex domains such as software updating. Our work seeks to improve the efficacy of security advice by exploring a new approach: video entertainment(More)
The behavior of the least-secure user can influence security and privacy outcomes for everyone else. Thus, it is important to understand the factors that influence the security and privacy of a broad variety of people. Prior work has suggested that users with differing socioeconomic status (SES) may behave differently; however, no research has examined how(More)
Taxi sharing services are increasingly becoming important to meet rising accessibility needs and maintain stable income-earning societies with rising social capital [1]. Mobile platforms for taxi sharing are currently in development both commercially and within academic institutions. The success of these platforms relies not only on robust algorithms but(More)