Skip to main content

Privacy and Security Perceptions in Augmented Cognition Applications

  • Conference paper
  • First Online:
Augmented Cognition (HCII 2023)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 14019))

Included in the following conference series:

  • 663 Accesses

Abstract

Perceptions of security and privacy influence users’ behavior with security mechanisms such as passwords and multifactor authentication. Users tend to practice insecure behaviors based on their perception of security and convenience. This paper highlights the alignment between privacy and security perceptions and the possibilities for augmented cognition in HCI and instructional design to improve security-related behaviors for access control.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)

    Article  Google Scholar 

  2. Andriotis, P., Tryfonas, T., Oikonomou, G.: Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 115–126. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07620-1_11

    Chapter  Google Scholar 

  3. Choong, Y.-Y.: A cognitive-behavioral framework of user password management lifecycle. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 127–137. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07620-1_12

    Chapter  Google Scholar 

  4. Colnago, J., et al.: “It’s not actually that horrible”: exploring adoption of two-factor authentication at a university. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–11 (2018). https://doi.org/10.1145/3173574.3174030

  5. Feng, L., Cho, K.L., Song, C., Xu, C., Jin, X.: Brain password: a secure and truly cancelable brain biometrics for smart headwear. In: The 16th Annual International Conference, MobiSys 2018 (2018)

    Google Scholar 

  6. Gao, X., Yang, Y., Liu, C., Mitropoulos, C., Lindqvist, J., Oulasvirta, A.: Forgetting of passwords: ecological theory and data. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 221–238 (2018)

    Google Scholar 

  7. Kahneman, D.: Thinking, Fast and Slow. Macmillan (2011)

    Google Scholar 

  8. Karray, F., Alemzadeh, M., Saleh, J.A., Arab, M.N.: Human-computer interaction: overview on state of the art. Int. J. Smart Sens. Intell. Syst. 1(1), 137–159 (2008). https://doi.org/10.21307/ijssis-2017-283

    Article  Google Scholar 

  9. Loos, L.A., Ogawa, M.-B., Crosby, M.E.: Cognitive variability factors and passphrase selection. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) HCII 2020. LNCS (LNAI), vol. 12197, pp. 383–394. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-50439-7_26

    Chapter  Google Scholar 

  10. Marky, K., et al.: “Nah, it’s just annoying!” a deep dive into user perceptions of two-factor authentication. ACM Trans. Comput.-Hum. Interact. 29(5), 32, Article no. 43 (2022). https://doi.org/10.1145/3503514

  11. Mogire, N., Minas, R.K., Crosby, M.E.: Probing for psycho-physiological correlates of cognitive interaction with cybersecurity events. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) HCII 2020. LNCS (LNAI), vol. 12197, pp. 405–415. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-50439-7_28

    Chapter  Google Scholar 

  12. Nield, D.: How to Unlock Your iPhone With a Security Key. Wired (2023). https://www.wired.com/story/how-to-unlock-iphone-physical-security-key/

  13. Norman, D.: The Design of Everyday Things. Revised and Expanded Edition. Basic Books (2013)

    Google Scholar 

  14. Picard, R.: Automating the recognition of stress and emotion: from lab to real-world impact. Multimed. IEEE. 23, 3–7 (2016). https://doi.org/10.1109/MMUL.2016.38

    Article  Google Scholar 

  15. Posner, M.I., Snyder, C.R.R.: Attention and cognitive control. In: Solso, R.L. (ed.) Information Processing and Cognition: The Loyola Symposium, pp. 55–85. Lawrence Erlbaum Associates, Hillsdale (1975)

    Google Scholar 

  16. Thompson, D.: Why the Age of American Progress Ended: Invention Alone Can’t Change the World; What Matters is What Happens Next. The Atlantic (2023)

    Google Scholar 

  17. Zhang, Y., Monrose, F., Reiter, M.K.: The security of modern password expiration: an algorithmic framework and empirical analysis. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 176–186. ACM (2010)

    Google Scholar 

Download references

Acknowledgements

This material is based upon work supported by the National Science Foundation (NSF) under Grant No. 1662487. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael-Brian Ogawa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ogawa, MB., Auernheimer, B., Endicott-Popovsky, B., Hinrichs, R., Crosby, M.E. (2023). Privacy and Security Perceptions in Augmented Cognition Applications. In: Schmorrow, D.D., Fidopiastis, C.M. (eds) Augmented Cognition. HCII 2023. Lecture Notes in Computer Science(), vol 14019. Springer, Cham. https://doi.org/10.1007/978-3-031-35017-7_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35017-7_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35016-0

  • Online ISBN: 978-3-031-35017-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics