[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3633500.3633506acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

‘Ought’ should not assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability Approach

Published: 22 December 2023 Publication History

Abstract

We inhabit a ‘digital first’ society, which is only viable if everyone, regardless of ability and capacity, is able to benefit from online offerings in a safe and secure way. However, disabled individuals, people living under oppressive regimes, elderly citizens and individuals fleeing conflict can be excluded, because they might not have the opportunity to implement cybersecurity hygiene measures. To reduce this potential exclusion, it is crucial to make all users’ situated realities focal variables in policy debates and provisioning efforts. This requires a validated set of basic minimum capabilities which reflect individuals’ diverse personal and social realities. In this paper, we report on a scoping literature review intended to reveal the state of play with respect to capabilities-related research in the cyber domain. We motivate our initial focus on the over 65s for this investigation. We used advice from online government cybersecurity advisories to arrive at a set of five recommended cybersecurity hygiene tasks. These fed into a survey with sixty senior citizens to elicit the barriers they could envisage someone of their age encountering, in acting upon cybersecurity hygiene advice. The final deliverable is a candidate list of basic capabilities (cybersecurity) for seniors. This enables us to start measuring security and privacy poverty, an essential step in recognising and mitigating exclusion, as well as informing threat modelling efforts.

References

[1]
Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. 2016. You Get Where You’re Looking for: The Impact of Information Sources on Code Security. In Symposium on Security and Privacy (SP). IEEE, San Jose, CA, 289–305. 10.1109/SP.2016.25.
[2]
Nora Alkaldi and Karen Renaud. 2022. MIGRANT: modeling smartphone password manager adoption using migration theory. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 53, 2 (2022), 63–95.
[3]
Sabina Alkire and Rufus Black. 1997. A practical reasoning theory of development ethics: furthering the capabilities approach. Journal of International Development 9, 2 (1997), 263–279. 10.1002/(SICI)1099-1328(199703)9:2%3C263::AID-JID439%3E3.0.CO;2-D.
[4]
Kira Allmann. 2022. UK digital poverty evidence review 2022. https://digitalpovertyalliance.org/uk-digital-poverty-evidence-review-2022/ Accessed 26 March 2023.
[5]
Abdullah Alqahtani. 2019. Usability Testing of Google Cloud Applications: Students’ Perspective. Journal of Technology and Science Education 9, 3 (2019), 326–339.
[6]
Uchenna Daniel Ani, Hongmei He, and Ashutosh Tiwari. 2019. Human factor security: evaluating the cybersecurity capacity of the industrial workforce. Journal of Systems and Information Technology 21, 1 (2019), 2–35. https://doi.org/10.1108/JSIT-02-2018-0028.
[7]
Elina Argyridou, Sokratis Nifakos, Christos Laoudias, Sakshyam Panta, Emmanouil Panaousis, Krishna Chandramouli, Diana Navarro-Llobet, Juan Mora, Panagiotis Papachristou Zamorano, and Stefano Bonacina. 2023. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Healthcare Organisations. Journal of Medical Internet Research (Preprint) 25, Article e41294 (2023), In Press pages. https://doi.org/10.2196/41294.
[8]
BAILLII. 2019. England and Wales Court of Protection Decisions. https://www.bailii.org/ew/cases/EWCOP/2019/3.html.
[9]
Shahryar Baki and Rakesh M Verma. 2022. Sixteen Years of Phishing User Studies: What Have We Learned?IEEE Transactions on Dependable and Secure Computing 20, 2 (2022), 1200–1212. 10.1109/TDSC.2022.3151103.
[10]
Catherine Barber. 2008. Notes on poverty and inequality. Oxfam International. https://oxfamilibrary.openrepository.com.
[11]
Marios Belk, Panagiotis Germanakos, Christos Fidas, George Spanoudis, and George Samaras. 2013. Studying the effect of human cognition on text and image recognition CAPTCHA mechanisms. In Human Aspects of Information Security, Privacy, and Trust: First International Conference, Held as Part of HCI International. Springer, Las Vegas, NV, USA, July 21-26, 71–79.
[12]
Omri Ben-Shahar. 2019. Data pollution. Journal of Legal Analysis 11 (2019), 104–159.
[13]
Jeremy Bentham. 1970. An Introduction to the Principles of Morals and Legislation (1789). In The collected works of Jeremy Bentham, J. H. Burns and H. L. A. Hart (Eds.). Clarendon Press, New York.
[14]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (2006), 77–101. https://doi.org/10.1191/1478088706qp063oa.
[15]
Tania Burchardt. 2004. Capabilities and disability: the capabilities framework and the social model of disability. Disability & Society 19, 7 (2004), 735–751. https://doi.org/10.1080/0968759042000284213.
[16]
Barnali Chakraborty, Sepideh Yousefzadeh, Shrinivas Darak, and Hinke Haisma. 2020. “We struggle with the earth everyday”: parents’ perspectives on the capabilities for healthy child growth in haor region of Bangladesh. BMC Public Health 20, 1 (2020), 1–14. https://doi.org/10.1186/s12889-020-8196-9.
[17]
Bruce Christianson. 1999. Auditing against Impossible Abstractions. In International Workshop on Security Protocols. Springer, Cambridge, UK, 60–64.
[18]
Stéphane Ciolino, Simon Parkin, and Paul Dunphy. 2019. Of two minds about two-factor: Understanding everyday FIDO u2f usability through device comparison and experience sampling. In Symposium on Usable Privacy and Security (SOUPS). USENIX, Santa Clara, USA, 339–356.
[19]
Lizzie Coles-Kemp and Rikke Bjerg Jensen. 2019. Accessing a New Land: Designing for a Social Conceptualisation of Access. In Proceedings of the CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland UK) (CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3290605.3300411.
[20]
Cas Cremers, Jaiden Fairoze, Benjamin Kiesl, and Aurora Naska. 2020. Clone detection in secure messaging: improving post-compromise security in practice. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, Virtual, 1481–1495. https://doi.org/10.1145/3372297.3423354.
[21]
Sanchari Das, Gianpaolo Russo, Andrew C Dingman, Jayati Dev, Olivia Kenny, and L Jean Camp. 2018. A qualitative study on usability and acceptability of Yubico security key. In Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust. ACM, Orlando, USA, 28–39. https://doi.org/10.1145/3167996.3167997.
[22]
Partha Das Chowdhury and Bruce Christianson. 2010. More Security or Less Insecurity. In The 18th International Security Protocols Workshop(Lecture Notes in Computer Science, Vol. 7061), B. Christianson and J. A. Malcolm (Eds.). Springer Verlag, Cambridge, UK, 115–119.
[23]
Partha Das Chowdhury, Lizzie Coles-Kemp, Karolina Follis, Sanja Milivojevic, Awais Rashid, Genevieve Liveley, Gina Netto, Andres Dominguez, Ross Anderson, and Kopo Marvin Ramokapane. 2023. From Utility to Capability: A Manifesto for Equitable Security and Privacy for All. https://bpb-eu-w2.wpmucdn.com/blogs.bristol.ac.uk/dist/1/670/files/2023/02/Capability-Approach-Manifesto.pdf.
[24]
Partha Das Chowdhury, Joseph Hallett, Nikhil Patnaik, Mohammad Tahaei, and Awais Rashid. 2021. Developers are neither enemies nor users: they are collaborators. In IEEE Secure Development Conference (SecDev). IEEE, Virtual, 47–55. 10.1109/SecDev51306.2021.00023.
[25]
Partha Das Chowdhury, Andrés Domínguez Hernández, Marvin Ramokapane, and Awais Rashid. 2022. From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs. In New Security Paradigms Workshop, Vol. Forthcoming. Association for Computing Machinery (ACM), New Hampshire, USA. https://doi.org/10.1145/3584318.3584323.
[26]
Partha Das Chowdhury, Maria Sameen, Jenny Blessing, Nicholas Boucher, Joseph Gardiner, Tom Burrows, Ross Anderson, and Awais Rashid. 2023. Threat Models over Space and Time: A Case Study of E2EE Messaging Applications. arXiv preprint arXiv:2301.05653.
[27]
Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, and Michael Backes. 2017. Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (Dallas, Texas, USA) (CCS ’17). Association for Computing Machinery, New York, NY, USA, 2187–2200. https://doi.org/10.1145/3133956.3134059
[28]
Jean Drèze and Amartya Sen. 2012. Putting growth in its place. Yojana 56 (2012), 36–40.
[29]
Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and security threat models and mitigation strategies of older adults. In Fifteenth Symposium on Usable Privacy and Security (SOUPS). 21–40.
[30]
Des Gasper. 2017. What is the capability approach? Its core, rationale, partners and dangers. The Journal of Socio-Economics 36 (2017), 335–359. https://doi.org/10.1016/j.socec.2006.12.001.
[31]
Hana Habib, Sarah Pearman, Jiamin Wang, Yixin Zou, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2020. "It’s a scavenger hunt": Usability of Websites’ Opt-Out and Data Deletion Choices. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1–12.
[32]
Hsiao-Ying Huang and Masooda Bashir. 2018. Surfing safely: Examining older adults’ online privacy protection behaviors. Proceedings of the Association for Information Science and Technology 55, 1 (2018), 188–197. https://doi.org/10.1002/pra2.2018.14505501021.
[33]
Rikke Bjerg Jensen, Lizzie Coles-Kemp, and Reem Talhouk. 2020. When the Civic Turn Turns Digital: Designing Safe and Secure Refugee Resettlement. Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10.1145/3313831.3376245.
[34]
Michael O Jewell, Enrico Costanza, and Jacob Kittley-Davies. 2015. Connecting the things to the internet: an evaluation of four configuration strategies for Wi-Fi devices with minimal user interfaces. In Proceedings of the International Joint Conference on pervasive and ubiquitous computing. ACM, Osaka Japan, 767–778. https://doi.org/10.1145/2750858.2807535.
[35]
Adam Joinson and Tommy van Steen. 2018. Human aspects of cyber security: Behaviour or culture change?Cyber Security: A Peer-Reviewed Journal 1, 4 (2018), 351–360.
[36]
Anita K Jones. 1978. The object model: A conceptual tool for structuring software. In Operating Systems: An Advanced Course, R. Bayer, R.M. Graham, and G. Seegmüller (Eds.). Springer, Berlin, Germany, Chapter 2A, 7–16.
[37]
Bran Knowles, Vicki L Hanson, Yvonne Rogers, Anne Marie Piper, Jenny Waycott, Nigel Davies, Aloha Hufana Ambe, Robin N Brewer, Debaleena Chattopadhyay, Marianne Dee, and D. Frohlich. 2021. The harm in conflating aging with accessibility. Commun. ACM 64, 7 (2021), 66–71. https://doi.org/10.1145/3431280.
[38]
Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, and Serge Egelman. 2011. Of passwords and people: measuring the effect of password-composition policies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Vancouver, Canada, 2595–2604. https://doi.org/10.1145/1978942.1979321.
[39]
Philipp Korherr and Dominik Kanbach. 2023. Human-related capabilities in big data analytics: A taxonomy of human factors with impact on firm performance. Review of Managerial Science 17 (2023), 1943–1970. https://doi.org/10.1007/s11846-021-00506-4.
[40]
Butler W Lampson and Howard E Sturgis. 1976. Reflections on an operating system design. Commun. ACM 19, 5 (1976), 251–265. https://doi.org/10.1145/360051.360074.
[41]
Tian Lin, Daniel E Capecci, Donovan M Ellis, Harold A Rocha, Sandeep Dommaraju, Daniela S Oliveira, and Natalie C Ebner. 2019. Susceptibility to spear-phishing emails: Effects of internet user demographics and email content. ACM Transactions on Computer-Human Interaction (TOCHI) 26, 5 (2019), 1–28. https://doi.org/10.1145/3336141.
[42]
Peter Lošonczi. 2018. Importance of dealing with cybersecurity challenges and cybercrime in the senior population. Security Dimensions 26 (2018), 173–186.
[43]
Alan F Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L Mazurek, and Nora McDonald. 2023. How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities. literacy 36, 38, Article 62 (2023).
[44]
Nora McDonald and Andrea Forte. 2020. The politics of privacy theories: Moving from norms to vulnerabilities. In Proceedings of the CHI Conference on Human Factors in Computing Systems. ACM, Honolulu, USA, April 25 - 30, 1–14. https://doi.org/10.1145/3313831.3376167.
[45]
Maryam Mehrnezhad, Abbas Ghaemi Bafghi, Ahad Harati, and Ehsan Toreini. 2017. PiSHi: click the images and I tell if you are a human. International Journal of Information Security 16 (2017), 133–149. https://doi.org/10.1007/s10207-015-0311-z.
[46]
Helena M Mentis, Galina Madjaroff, and Aaron K Massey. 2019. Upside and downside risk in online security for older adults with mild cognitive impairment. In Proceedings of the CHI Conference on Human Factors in Computing Systems. ACM, Glasgow, UK, 1–13. https://doi.org/10.1145/3290605.3300573.
[47]
Miro. 2022. Miro | Online Whiteboard for Visual Collaboration. https://miro.com/.
[48]
Hylton Mitchell. 2014. Information and communication technologies and the urban transformation of South African informal settlement communities. Master’s thesis. Urban Planning and Management, University of Cape Town.
[49]
Sheba Sharla Mohammid. 2017. Digital media, learning and social confidence: an ethnography of a small island knowledge society. Ph. D. Dissertation. RMIT University.
[50]
Sape J Mullender and Andrew S Tanenbaum. 1986. The design of a capability-based distributed operating system. Comput. J. 29, 4 (1986), 289–299.
[51]
Tobias Nef, Raluca L Ganea, René M Müri, and Urs P Mosimann. 2013. Social networking sites and older users–a systematic review. International Psychogeriatrics 25, 7 (2013), 1041–1053. https://doi.org/10.1017/S1041610213000355.
[52]
Martha C. Nussbaum. 2000. Women and Human Development: The Capabilities Approach. In The Seeley Lectures. Cambridge University Press, Cambridge, UK. https://doi.org/10.1017/CBO9780511841286.
[53]
Alessandro Oltramari, Diane S Henshel, Mariana Cains, and Blaine Hoffman. 2015. Towards a Human Factors Ontology for Cyber Security. In Proceedings of the Tenth Conference on Semantic Technology for Intelligence, Defense, and Security, Fairfax VA, USA, November 18-20. 26–33.
[54]
World Health Organization. 2020. Infant mortality. https://www.who.int/data/gho/data/themes/topics/indicator-groups/indicator-group-details/GHO/infant-mortality.
[55]
Odoyo Collins Otieno and Samuel Liyala. 2018. Mobile money users’ functionings and freedoms: Amartya Sen’s capability approach. World Journal of Computer Application and Technology 6, 1 (2018), 14–22. 10.13189/wjcat.2018.060102.
[56]
Prashant Palvia, Naveed Baqir, and Hamid Nemati. 2018. ICT for socio-economic development: A citizens’ perspective. Information & Management 55, 2 (2018), 160–176. https://doi.org/10.1016/j.im.2017.05.003.
[57]
Harsha Perera, Waqar Hussain, Davoud Mougouei, Rifat Ara Shams, Arif Nurwidyantoro, and Jon Whittle. 2019. Towards integrating human values into software: Mapping principles and rights of GDPR to values. In 27th international Requirements Engineering Conference (RE). IEEE, Jeju, Korea (South), 404–409. https://doi.org/10.1109/RE.2019.00053.
[58]
Anabel Quan-Haase and Isioma Elueze. 2018. Revisiting the privacy paradox: Concerns and protection strategies in the social media experiences of older adults. In Proceedings of the 9th International Conference on Social Media and Society. 150–159. https://doi.org/10.1145/3217804.3217907.
[59]
Anabel Quan-Haase and Dennis Ho. 2020. Online privacy concerns and privacy protection strategies among older adults in East York, Canada. Journal of the Association for Information Science and Technology 71, 9 (2020), 1089–1102. https://doi.org/10.1002/asi.24364.
[60]
Paul Ralph. 2021. ACM SIGSOFT empirical standards released. ACM SIGSOFT Software Engineering Notes 46, 1 (2021), 19–19. https://doi.org/10.1145/3437479.3437483.
[61]
Karen Renaud and Lizzie Coles-Kemp. 2022. Accessible and inclusive cyber security: a nuanced and complex challenge. SN Computer Science 3, 5 (2022), 1–14. https://doi.org/10.1007/s42979-022-01239-1.
[62]
Karen Renaud, Graham Johnson, and Jacques Ophoff. 2020. Dyslexia and password usage: accessibility in authentication design. In Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 International Symposium, HAISA. Springer, Mytilene, Lesbos, Greece, July 8–10, 259–268. https://doi.org/10.1007/978-3-030-57404-8_20.
[63]
Karen Renaud, Robert Otondo, and Merrill Warkentin. 2019. “This is the way ‘I’create my passwords”... does the endowment effect deter people from changing the way they create their passwords?Computers & Security 82 (2019), 241–260. https://doi.org/10.1016/j.cose.2018.12.018.
[64]
Hannah Ritchie. 2019. The world population is changing: For the first time there are more people over 64 than children younger than 5. https://ourworldindata.org/population-aged-65-outnumber-children.
[65]
William Roden and Lucas Layman. 2020. Cry Wolf: Toward an Experimentation Platform and Dataset for Human Factors in Cyber Security Analysis. In Proceedings of the ACM Southeast Conference. ACM, Tampa, USA, April 2 - 4, 264–267. https://doi.org/10.1145/3374135.3385301.
[66]
Rohani Rohan, Suree Funilkul, Debajyoti Pal, and Wichian Chutimaskul. 2021. Understanding of Human Factors in Cybersecurity: A Systematic Literature Review. In International Conference on Computational Performance Evaluation (ComPE). IEEE, Shillong, India, 133–140. 10.1109/ComPE53109.2021.9752358.
[67]
Ute Schauberger. 2023. Universal Barriers to Access. https://uteschauberger.com/barrierstoaccess.html.
[68]
Ari Schlesinger, W. Keith Edwards, and Rebecca E. Grinter. 2017. Intersectional HCI: Engaging Identity through Gender, Race, and Class. Association for Computing Machinery, New York, NY, USA, 5412–5427. https://doi.org/10.1145/3025453.3025766
[69]
Amartya Sen. 1992. The Political Economy of Targeting. Keynote Address In D. van de Walle and K. Nead, eds., Public Spending and the Poor (Washington, DC, World Bank 1995).
[70]
Amartya Sen. 1994. The Formulation of Rational Choice. American Economic Review 84, 2 (1994), 385–90. https://www.jstor.org/stable/2117864.
[71]
Amartya Sen. 1995. Rationality and social choice. The American Economic Review 85, 1 (1995), 1–24.
[72]
Amartya K Sen. 1976. The Standard of Living. Cambridge: Cambridge University Press.
[73]
Amartya K. Sen. 1979. Equality of What? In McMurrin S Tanner Lectures on Human Values. Vol. 1. Cambridge: Cambridge University Press, 1987, Cambridge, UK. Reprinted in John Rawls and Charles Fried and Amartya Sen and Thomas C Schelling. Sterling M. McMurrin (Ed), Liberty, Equality and Law.
[74]
Amartya K. Sen. 1993. Capability and Well-Being. In The Quality of Life, M Nussbaum and A Sen (Eds.). Clarendon Press, Oxford, 9–29.
[75]
Amartya K. Sen. 2015. Universal Health Care. Harvard Public Health Review 5 (2015), 1–8. https://www.jstor.org/stable/48503117.
[76]
Mattea Sim, Kurt Hugenberg, Tadayoshi Kohno, and Franziska Roesner. 2023. A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design. In New Security Paradigms Workshop.
[77]
Weerachet Sinlapanuntakul, Crystal M Fausett, and Joseph R Keebler. 2022. Exploring Team Competencies in Cybersecurity. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, 1 (2022), 1110–1114. https://doi.org/10.1177/1071181322661496.
[78]
Sulayman K Sowe, Eric Simmon, Koji Zettsu, Frederic De Vaulx, and Irena Bojanova. 2016. Cyber-physical-human systems: Putting people in the loop. IT Professional 18, 1 (2016), 10–13. https://doi.org/10.1109/MITP.2016.14.
[79]
Julie Stella and Michael Corry. 2017. A capability approach for online primary and secondary students with disabilities. British Journal of Special Education 44, 4 (2017), 448–464. https://doi.org/10.1111/1467-8578.12187.
[80]
Nathalie Stembert, Arne Padmos, Mortaza S Bargh, Sunil Choenni, and Frans Jansen. 2015. A study of preventing email (spear) phishing by enabling human intelligence. In European Intelligence and Security Informatics Conference. IEEE, Manchester, UK, 113–120. https://doi.org/10.1109/EISIC.2015.38.
[81]
Rongjun Sun and Zhenmei Zhang. 2023. Leisure activities and cognitive impairment in old age: The role of life course socioeconomic status. Aging & Mental Health 27, 2 (2023), 326–333. https://doi.org/10.1080/13607863.2022.2046694.
[82]
Mohammad Tahaei, Ruba Abu-Salma, and Awais Rashid. 2023. Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. In Proceedings of the CHI Conference on Human Factors in Computing Systems(CHI ’23). ACM, Hamburg, Germany, Article 168, 1-24 pages. https://doi.org/10.1145/3544548.3581060.
[83]
Mohammad Tahaei, Julia Bernd, and Awais Rashid. 2022. Privacy, permissions, and the health app ecosystem: A stack overflow exploration. In Proceedings of the European Symposium on Usable Security. ACM, Karlsruhe, Germany, 117–130. https://doi.org/10.1145/3549015.3555669.
[84]
Mohammad Tahaei and Kami Vaniea. 2019. A Survey on Developer-Centred Security. In European Symposium on Security and Privacy Workshops (EuroS PW). IEEE, Stockholm, Sweden, 129–138. https://doi.org/10.7488/ds/2535. .
[85]
Riley Taitingfong, Cinnamon S Bloss, Cynthia Triplett, Julie Cakici, Nanibaa’ Garrison, Shelley Cole, Julie A Stoner, and Lucila Ohno-Machado. 2020. A systematic literature review of Native American and Pacific Islanders’ perspectives on health data privacy in the United States. Journal of the American Medical Informatics Association 27, 12 (10 2020), 1987–1998. https://doi.org/10.1093/jamia/ocaa235.
[86]
Jiang Tao and Hu Shuijing. 2016. The elderly and the big data how older adults deal with digital privacy. In International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). IEEE, 285–288.
[87]
David Toews. 2008. A socially-just Internet: The digital divide, cybercultural agency, and human capabilities. Studies in Social Justice 2, 1 (2008), 67–78. https://doi.org/10.26522/ssj.v2i1.968.
[88]
Yasue Uchida, Saiko Sugiura, Yukiko Nishita, Naoki Saji, Michihiko Sone, and Hiromi Ueda. 2019. Age-related hearing loss and cognitive decline—The potential mechanisms linking the two. Auris Nasus Larynx 46, 1 (2019), 1–9. https://doi.org/10.1016/j.anl.2018.08.010.
[89]
United Nations. [n. d.]. World Population Prospects 2022.
[90]
Blase Ur, Fumiko Noma, Jonathan Bees, Sean M Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2015. I added ‘!’ at the end to make it secure: Observing password creation in the lab. In Proc. SOUPS. ACM, Ottawa, Canada, 123–140.
[91]
Rick van der Kleij and Rutger Leukfeldt. 2020. Cyber resilient behavior: Integrating human behavioral models and resilience engineering capabilities into cyber security. In Advances in Human Factors in Cybersecurity: Proceedings of the AHFE International Conference on Human Factors in Cybersecurity, July 24-28. Springer, Washington DC, USA, 16–27. https://doi.org/10.1007/978-3-030-20488-4_2.
[92]
Dirk Van Der Linden, Emma Williams, Joseph Hallett, and Awais Rashid. 2020. The impact of surface features on choice of (in)secure answers by Stackoverflow readers. IEEE Transactions on Software Engineering (20 April 2020), 1–18. https://doi.org/10.1109/tse.2020.2981317
[93]
Luis Von Ahn, Manuel Blum, Nicholas J Hopper, and John Langford. 2003. CAPTCHA: Using hard AI problems for security. In Eurocrypt, Vol. 2656. Springer, Warsaw, Poland, 294–311.
[94]
Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L Mazurek, Manya Sleeper, and Kurt Thomas. 2022. SOK: A framework for unifying at-risk user research. In IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, USA, 2344–2360. https://doi.org/10.1109/SP46214.2022.9833643.
[95]
Jonathan Woodruff, Robert NM Watson, David Chisnall, Simon W Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G Neumann, Robert Norton, and Michael Roe. 2014. The CHERI capability model: Revisiting RISC in an age of risk. ACM SIGARCH Computer Architecture News 42, 3 (2014), 457–468. https://doi.org/10.1145/2678373.2665740.

Cited By

View all
  • (2024)Advocating a Policy Push Toward Inclusive and Secure “Digital-First” SocietiesIEEE Security and Privacy10.1109/MSEC.2024.343127822:5(23-31)Online publication date: 1-Sep-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
NSPW '23: Proceedings of the 2023 New Security Paradigms Workshop
September 2023
136 pages
ISBN:9798400716201
DOI:10.1145/3633500
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 December 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. capability approach
  2. cybersecurity hygiene
  3. list of basic capabilities

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • EPSRC

Conference

NSPW '23
NSPW '23: New Security Paradigms Workshop
September 18 - 21, 2023
Segovia, Spain

Acceptance Rates

Overall Acceptance Rate 98 of 265 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)212
  • Downloads (Last 6 weeks)10
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Advocating a Policy Push Toward Inclusive and Secure “Digital-First” SocietiesIEEE Security and Privacy10.1109/MSEC.2024.343127822:5(23-31)Online publication date: 1-Sep-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media