Order:
  1.  25
    Perceptions of Beauty in Security Ceremonies.Giampaolo Bella, Jacques Ophoff, Karen Renaud, Diego Sempreboni & Luca Viganò - 2022 - Philosophy and Technology 35 (3):1-34.
    When we use secure computer systems, we engage with carefully orchestrated and ordered interactions called “security ceremonies”, all of which exist to assure security. A great deal of attention has been paid to improving the usability of these ceremonies over the last two decades, to make them easier for end-users to engage with. Yet, usability improvements do not seem to have endeared end users to ceremonies. As a consequence, human actors might subvert the ceremony’s processes or avoid engaging with it. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  25
    Scoping the ethical principles of cybersecurity fear appeals.Marc Dupuis & Karen Renaud - 2020 - Ethics and Information Technology 23 (3):265-284.
    Fear appeals are used in many domains. Cybersecurity researchers are also starting to experiment with fear appeals, many reporting positive outcomes. Yet there are ethical concerns related to the use of fear to motivate action. In this paper, we explore this aspect from the perspectives of cybersecurity fear appealdeployersandrecipients. We commenced our investigation by considering fear appeals from three foundational ethical perspectives. We then consulted the two stakeholder groups to gain insights into the ethical concerns they consider to be pertinent. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark