Searched for: subject%3A%22Notifications%22
(1 - 14 of 14)
document
Geers, Artur (author), Ding, Aaron Yi (author), Hernandez Ganan, C. (author), Parkin, S.E. (author)
The smishing-based malware Flubot was taken down in mid-2022, yet there is little understanding of how it directly impacted smartphone users. We engage with customers of a partner Internet Service Provider (ISP), who have suffered a Flubot infection on their smartphones. We surveyed 87 ISP customers who had been notified of a Flubot infection,...
conference paper 2023
document
Lingler, Alexander (author), Talypova, Dinara (author), Draxler, Fiona (author), Schneegass, C. (author), Dingler, Tilman (author), Wintersberger, Philipp (author)
Attention management systems seek to minimize disruption by intelligently timing interruptions and helping users navigate multiple tasks and activities. While there is a solid theoretical basis and rich history in HCI research for attention management, little progress has been made regarding their practical implementation and deployment....
conference paper 2023
document
Lone, Q.B. (author)
IP spoofing is the act of forging source IP addresses assigned to a host machine. Spoofing provides users the ability to hide their identity and impersonate another machine. Malicious users use spoofing to invoke a variety of attacks. Examples are Distributed Denial of Service (DDoS) attacks, policy evasion and a range of application-level...
doctoral thesis 2022
document
Rodriguez, Elsa (author), Fukkink, Max (author), Parkin, S.E. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
Consumer IoT devices may suffer malware attacks, and be recruited into botnets or worse. There is evidence that generic advice to device owners to address IoT malware can be successful, but this does not account for emerging forms of persistent IoT malware. Less is known about persistent malware, which resides on persistent storage, requiring...
conference paper 2022
document
Turcios Rodriguez, E.R. (author), Verstegen, S. (author), Noroozian, A. (author), Inoue, Daisuke (author), Kasama, Takahiro (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
Internet Service Providers (ISPs) are getting involved in remediating Internet of Things (IoT) infections of end users. This endeavor runs into serious usability problems. Given that it is usually unknown what kind of device is infected, they can only provide users with very generic cleanup advice, trying to cover all device types and...
journal article 2021
document
Bisogni, F. (author)
In response to evolving cybersecurity challenges, global spending on information security has grown steadily, and could eventually reach a level that is inefficient and unaffordable. A better understanding of new socio-technical-economic complexities around information security is urgently needed, which requires both reconsideration of...
doctoral thesis 2020
document
Çetin, F.O. (author)
Resources on the Internet allow constant communication and data sharing between Internet users. While these resources keep vital information flowing, cybercriminals can easily compromise and abuse them, using them as a platform for fraud and misuse. Every day, we observe millions of internet-connected resources are being abused in criminal...
doctoral thesis 2020
document
Bisogni, F. (author), Asghari, H. (author)
This article investigates the relationship between data breaches and identity theft, including the impact of Data Breach Notification Laws (DBNL) on these incidents (using empirical data and Bayesian modeling). We collected incident data on breaches and identity thefts over a 13-year timespan (2005–2017) in the United States. Our analysis shows...
journal article 2020
document
Lukosch, S.G. (author), den Hengst-Bruggeling, Mariëlle (author), Horsch, C.H.G. (author), Datcu, Dragos (author), Engelbrecht, H. (author)
The police organization is highly dependent on information. Frontline police officers are working on the streets and need the right information at the right time. Mobile technology can provide location-based information and could be of great assistance to them. We developed a mobile location-based real-time notification system and conducted...
journal article 2018
document
Bisogni, F. (author)
This article investigates the adequateness of data breach notification laws and the possible impact of a federal law in the United States. Based on the analysis of 445 notifications issued in 2014, three observations for law development are presented. First, the question about underreporting is raised and a possible option for facilitating its...
journal article 2016
document
Bisogni, F. (author)
While the discussion about a federal law on data breach notification is ongoing and a rash of large, costly data breaches has galvanized public interest in the issue, this paper investigates on the phenomenon of data breach notification letters. In case of any data breach a company faces a number of dilemmas on how to inform the customers.<br/...
conference paper 2015
document
Streefkerk, J.W. (author)
The main argument in this thesis is that mobile technology has to adapt information presentation to the mobile use context and Human Factors (attention, workload and individual characteristics). This will provide better support for work in these domains than non-adaptive systems. We expect such context-aware mobile support (CAMS) systems to...
doctoral thesis 2011
document
Vastenburg, M.H. (author), Keyson, D.V. (author), De Ridder, H. (author)
Recent field experiments on acceptability of notifications in the home showed that people generally want to be informed of urgent messages as soon as possible, whereas non-urgent messages should not be presented at all. A possible way to improve the acceptability of a notification might be to adjust the presentation mode and the timing of...
journal article 2009
document
Vastenburg, M.H. (author), Keyson, D.V. (author), De Ridder, H. (author)
A field study in ten homes was conducted to understand what influences users’ acceptability of notifications in the home environment. The key finding is that perceived message urgency is the primary indicator of acceptability of notifications in the home—if people think a message is urgent, they want the message to be shown immediately,...
journal article 2007
Searched for: subject%3A%22Notifications%22
(1 - 14 of 14)