Abstract
Perceptions of security and privacy influence users’ behavior with security mechanisms such as passwords and multifactor authentication. Users tend to practice insecure behaviors based on their perception of security and convenience. This paper highlights the alignment between privacy and security perceptions and the possibilities for augmented cognition in HCI and instructional design to improve security-related behaviors for access control.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)
Andriotis, P., Tryfonas, T., Oikonomou, G.: Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 115–126. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07620-1_11
Choong, Y.-Y.: A cognitive-behavioral framework of user password management lifecycle. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 127–137. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07620-1_12
Colnago, J., et al.: “It’s not actually that horrible”: exploring adoption of two-factor authentication at a university. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–11 (2018). https://doi.org/10.1145/3173574.3174030
Feng, L., Cho, K.L., Song, C., Xu, C., Jin, X.: Brain password: a secure and truly cancelable brain biometrics for smart headwear. In: The 16th Annual International Conference, MobiSys 2018 (2018)
Gao, X., Yang, Y., Liu, C., Mitropoulos, C., Lindqvist, J., Oulasvirta, A.: Forgetting of passwords: ecological theory and data. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 221–238 (2018)
Kahneman, D.: Thinking, Fast and Slow. Macmillan (2011)
Karray, F., Alemzadeh, M., Saleh, J.A., Arab, M.N.: Human-computer interaction: overview on state of the art. Int. J. Smart Sens. Intell. Syst. 1(1), 137–159 (2008). https://doi.org/10.21307/ijssis-2017-283
Loos, L.A., Ogawa, M.-B., Crosby, M.E.: Cognitive variability factors and passphrase selection. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) HCII 2020. LNCS (LNAI), vol. 12197, pp. 383–394. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-50439-7_26
Marky, K., et al.: “Nah, it’s just annoying!” a deep dive into user perceptions of two-factor authentication. ACM Trans. Comput.-Hum. Interact. 29(5), 32, Article no. 43 (2022). https://doi.org/10.1145/3503514
Mogire, N., Minas, R.K., Crosby, M.E.: Probing for psycho-physiological correlates of cognitive interaction with cybersecurity events. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) HCII 2020. LNCS (LNAI), vol. 12197, pp. 405–415. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-50439-7_28
Nield, D.: How to Unlock Your iPhone With a Security Key. Wired (2023). https://www.wired.com/story/how-to-unlock-iphone-physical-security-key/
Norman, D.: The Design of Everyday Things. Revised and Expanded Edition. Basic Books (2013)
Picard, R.: Automating the recognition of stress and emotion: from lab to real-world impact. Multimed. IEEE. 23, 3–7 (2016). https://doi.org/10.1109/MMUL.2016.38
Posner, M.I., Snyder, C.R.R.: Attention and cognitive control. In: Solso, R.L. (ed.) Information Processing and Cognition: The Loyola Symposium, pp. 55–85. Lawrence Erlbaum Associates, Hillsdale (1975)
Thompson, D.: Why the Age of American Progress Ended: Invention Alone Can’t Change the World; What Matters is What Happens Next. The Atlantic (2023)
Zhang, Y., Monrose, F., Reiter, M.K.: The security of modern password expiration: an algorithmic framework and empirical analysis. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 176–186. ACM (2010)
Acknowledgements
This material is based upon work supported by the National Science Foundation (NSF) under Grant No. 1662487. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ogawa, MB., Auernheimer, B., Endicott-Popovsky, B., Hinrichs, R., Crosby, M.E. (2023). Privacy and Security Perceptions in Augmented Cognition Applications. In: Schmorrow, D.D., Fidopiastis, C.M. (eds) Augmented Cognition. HCII 2023. Lecture Notes in Computer Science(), vol 14019. Springer, Cham. https://doi.org/10.1007/978-3-031-35017-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-031-35017-7_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35016-0
Online ISBN: 978-3-031-35017-7
eBook Packages: Computer ScienceComputer Science (R0)