Resources

Instructional Material

If you are using the Human-Computer Interaction in Cybersecurity Handbook for your course you can request to get access to instructional material.

Research Paper and Presentation

  • Cyber Security Awareness Among College Students

  • Advances in Human Factors in Cybersecurity pp 79-87

    • This study reports the early results of a study aimed to investigate student awareness and attitudes toward cybersecurity and the resulting risks in the most advanced technology environment: the Silicon Valley in California, USA. The composition of students in Silicon Valley is very ethnically diverse. The objective was to see how much the students in such a tech-savvy environment are aware of cyber-attacks and how they protect themselves against them. The early statistical analysis suggested that college students, despite their belief that they are observed when using the Internet and that their data is not secure even on university systems, are not very aware of how to protect their data. Also, it appears that educational institutions do not have an active approach to improve awareness among college students to increase their knowledge on these issues and how to protect themselves from potential cyber-attacks, such as identity theft or ransomware. Read More

    • Do You Really Trust “Privacy Policy” or “Terms of Use” Agreements Without Reading Them?

    • Jun 16, 2017, Springer, Advances in Human Factors in Cybersecurity , pp 290-295

      • An online survey was administered to college students asking them whether they read the terms of use and privacy policy when using services or applications, and if not, why. Also, when apps ask to have access to their location, contacts, or camera, do the students allow access or not, due to security concerns. One hundred and seventy students have completed the survey. Results suggest that 62% of participants “Agree” to not reading the terms of use or privacy policies, with the most common explanation being that the text is “too long.” For the question “Have you ever rejected a mobile app request for accessing your contacts, camera or location?” the answers are more encouraging. Ninety-two percent of those surveyed express that they “Yes,” have rejected access if they believe the app does not need to access the camera or contacts. Know More

    • Home Networking: Smart but Complicated

    • Jul 2014, Design, User Experience, and Usability. Design Philosophy, Methods, and Tools Lecture Notes in Computer Science Volume 8012, 2013, pp 107-114

      • The results of these investigations show that all of the major brands of home networking appliances use a complex, feature-oriented, rudimentary user interface (UI) design with terms that are understood by a very small percentage of people.Know More