↓ Skip to main content

Human Aspects of Information Security, Privacy, and Trust

Overview of attention for book
Cover of 'Human Aspects of Information Security, Privacy, and Trust'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Single Trial Authentication with Mental Password Writing
  3. Altmetric Badge
    Chapter 2 Leap Motion Controller for Authentication via Hand Geometry and Gestures
  4. Altmetric Badge
    Chapter 3 Predicting Graphical Passwords
  5. Altmetric Badge
    Chapter 4 Principles of Persuasion in Social Engineering and Their Use in Phishing
  6. Altmetric Badge
    Chapter 5 Chimera CAPTCHA: A Proposal of CAPTCHA Using Strangeness in Merged Objects
  7. Altmetric Badge
    Chapter 6 Effects of Password Permutation on Subjective Usability Across Platforms
  8. Altmetric Badge
    Chapter 7 “Too Taxing on the Mind!” Authentication Grids are not for Everyone
  9. Altmetric Badge
    Chapter 8 Human Generated Passwords – The Impacts of Password Requirements and Presentation Styles
  10. Altmetric Badge
    Chapter 9 The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords
  11. Altmetric Badge
    Chapter 10 Investigating the Use of Gesture-Based Passwords by the Seniors
  12. Altmetric Badge
    Chapter 11 Password Policy Languages: Usable Translation from the Informal to the Formal
  13. Altmetric Badge
    Chapter 12 Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication
  14. Altmetric Badge
    Chapter 13 Adjustable Fusion to Support Cyber Security Operators
  15. Altmetric Badge
    Chapter 14 The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring
  16. Altmetric Badge
    Chapter 15 Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
  17. Altmetric Badge
    Chapter 16 A Probabilistic Analysis Framework for Malicious Insider Threats
  18. Altmetric Badge
    Chapter 17 KYPO: A Tool for Collaborative Study of Cyberattacks in Safe Cloud Environment
  19. Altmetric Badge
    Chapter 18 Factors Contributing to Performance for Cyber Security Forensic Analysis
  20. Altmetric Badge
    Chapter 19 Towards a Successful Exercise Implementation – A Case Study of Exercise Methodologies
  21. Altmetric Badge
    Chapter 20 CYSM: An Innovative Physical/Cyber Security Management System for Ports
  22. Altmetric Badge
    Chapter 21 Factors that Influence Information Security Behavior: An Australian Web-Based Study
  23. Altmetric Badge
    Chapter 22 Pervasive Monitoring as an Insider Threat
  24. Altmetric Badge
    Chapter 23 Identifying Blind Spots in IS Security Risk Management Processes Using Qualitative Model Analysis
  25. Altmetric Badge
    Chapter 24 Privacy and Security in the Brave New World: The Use of Multiple Mental Models
  26. Altmetric Badge
    Chapter 25 Usable Trust: Grasping Trust Dynamics for Online Security as a Service
  27. Altmetric Badge
    Chapter 26 Exploring the Adoption of Physical Security Controls in Smartphones
  28. Altmetric Badge
    Chapter 27 What 4,500+ People Can Tell You – Employees’ Attitudes Toward Organizational Password Policy Do Matter
  29. Altmetric Badge
    Chapter 28 An Investigation of the Factors that Predict an Internet User’s Perception of Anonymity on the Web
  30. Altmetric Badge
    Chapter 29 Do Graphical Cues Effectively Inform Users?
  31. Altmetric Badge
    Chapter 30 Usable-Security Evaluation
  32. Altmetric Badge
    Chapter 31 Reminding Users of their Privacy at the Point of Interaction: The Effect of Privacy Salience on Disclosure Behaviour
  33. Altmetric Badge
    Chapter 32 Profit-Maximizing Trustworthiness Level of Composite Systems
  34. Altmetric Badge
    Chapter 33 Re-designing Permission Requirements to Encourage BYOD Policy Adherence
  35. Altmetric Badge
    Chapter 34 Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System
  36. Altmetric Badge
    Chapter 35 Hey, I Have a Problem in the System: Who Can Help Me? An Investigation of Facebook Users Interaction When Facing Privacy Problems
  37. Altmetric Badge
    Chapter 36 An Extensible Platform for the Forensic Analysis of Social Media Data
  38. Altmetric Badge
    Chapter 37 Opinions or Algorithms: An Investigation of Trust in People Versus Automation in App Store Security
  39. Altmetric Badge
    Chapter 38 SafetyPIN: Secure PIN Entry Through Eye Tracking
  40. Altmetric Badge
    Chapter 39 An Identification of Variables Influencing the Establishment of Information Security Culture
  41. Altmetric Badge
    Chapter 40 Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspective
  42. Altmetric Badge
    Chapter 41 Users’ Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II
  43. Altmetric Badge
    Chapter 42 Messaging Activity Reconstruction with Sentiment Polarity Identification
  44. Altmetric Badge
    Chapter 43 Televoting: Secure, Overseas Voting
  45. Altmetric Badge
    Chapter 44 Personalized Voting: The Intersection of Cloud and Mobility
  46. Altmetric Badge
    Chapter 45 Hobson’s Choice: Security and Privacy Permissions in Android and iOS Devices
  47. Altmetric Badge
    Chapter 46 Information Presentation: Considering On-line User Confidence for Effective Engagement
  48. Altmetric Badge
    Chapter 47 Privacy Principles in Design of Smart Homes Systems in Elderly Care
  49. Altmetric Badge
    Chapter 48 An Extension and Validation of the Task-Technology Fit: A Case of a Mobile Phone Voting System
  50. Altmetric Badge
    Chapter 49 Signs of Time: Designing Social Networking Site Profile Interfaces with Temporal Contextual Integrity
  51. Altmetric Badge
    Chapter 50 Poll Workers and Election Integrity: Security as if People Mattered
  52. Altmetric Badge
    Chapter 51 From V2X to Control2Trust
  53. Altmetric Badge
    Chapter 52 Security Implications for Personal Assistive Technology in Voting
  54. Altmetric Badge
    Chapter 53 Perceptions of Personal Privacy in Smart Home Technologies: Do User Assessments Vary Depending on the Research Method?
  55. Altmetric Badge
    Chapter 54 Risk Modeling and Analysis of Interdependencies of Critical Infrastructures Using Colored Timed Petri Nets
  56. Altmetric Badge
    Chapter 55 RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems
  57. Altmetric Badge
    Chapter 56 Putting a Hat on a Hen? Learnings for Malicious Insider Threat Prevention from the Background of German White-Collar Crime Research
  58. Altmetric Badge
    Chapter 57 Business and Threat Analysis of Ports’ Supply Chain Services
  59. Altmetric Badge
    Chapter 58 Insider Threats: The Major Challenge to Security Risk Management
  60. Altmetric Badge
    Chapter 59 Framework for Cloud Usability
  61. Altmetric Badge
    Chapter 60 Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures
  62. Altmetric Badge
    Chapter 61 Applying the ACPO Guidelines to Building Automation Systems
  63. Altmetric Badge
    Chapter 62 Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making
  64. Altmetric Badge
    Chapter 63 XACML Privacy Policy Editor for Critical Infrastructures
Attention for Chapter 4: Principles of Persuasion in Social Engineering and Their Use in Phishing
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • Good Attention Score compared to outputs of the same age (78th percentile)
  • High Attention Score compared to outputs of the same age and source (89th percentile)

Mentioned by

news
1 news outlet

Citations

dimensions_citation
7 Dimensions

Readers on

mendeley
149 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Principles of Persuasion in Social Engineering and Their Use in Phishing
Chapter number 4
Book title
Human Aspects of Information Security, Privacy, and Trust
Published in
Lecture notes in computer science, July 2015
DOI 10.1007/978-3-319-20376-8_4
Book ISBNs
978-3-31-920375-1, 978-3-31-920376-8
Authors

Ana Ferreira, Lynne Coventry, Gabriele Lenzini

Editors

Theo Tryfonas, Ioannis Askoxylakis

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 149 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Austria 2 1%
United Kingdom 1 <1%
Unknown 146 98%

Demographic breakdown

Readers by professional status Count As %
Student > Master 28 19%
Student > Bachelor 20 13%
Student > Ph. D. Student 17 11%
Researcher 12 8%
Student > Doctoral Student 11 7%
Other 21 14%
Unknown 40 27%
Readers by discipline Count As %
Computer Science 64 43%
Social Sciences 9 6%
Psychology 9 6%
Business, Management and Accounting 6 4%
Linguistics 3 2%
Other 11 7%
Unknown 47 32%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 7. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 18 January 2022.
All research outputs
#4,196,076
of 22,908,162 outputs
Outputs from Lecture notes in computer science
#989
of 8,129 outputs
Outputs of similar age
#52,904
of 264,183 outputs
Outputs of similar age from Lecture notes in computer science
#25
of 345 outputs
Altmetric has tracked 22,908,162 research outputs across all sources so far. Compared to these this one has done well and is in the 80th percentile: it's in the top 25% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,129 research outputs from this source. They receive a mean Attention Score of 5.0. This one has done well, scoring higher than 82% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 264,183 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 78% of its contemporaries.
We're also able to compare this research output to 345 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 89% of its contemporaries.