EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: person:"Al-Ameen, Mahdi Nasrullah"
Narrow search

Narrow search

Year of publication
Subject
All
User study 2 Autobiographical memory 1 Computer privacy 1 Facebook 1 Mental models 1 Perceptions 1 Security tools 1 Third-party applications 1 Usable security 1 User authentication 1
more ... less ...
Online availability
All
Undetermined 4
Type of publication
All
Article 4
Type of publication (narrower categories)
All
research-article 3
Language
All
English 4
Author
All
Al-Ameen, Mahdi Nasrullah 4 Wright, Matthew 2 Ahsan, M.A. Manazir 1 Chauhan, Apoorva 1 Dumaru, Prakriti 1 Haque, S.M. Taiabul 1 Haverkamp, Cassity 1 Kocabas, Huzeyfe 1 McClain, Maryellen Brunson 1 Paudel, Rizu 1 Seng, Sovantharith 1 Shrestha, Ankit 1
more ... less ...
Published in...
All
Information & Computer Security 4
Source
All
Other ZBW resources 4
Showing 1 - 4 of 4
Cover Image
“…I have my dad, sister, brother, and mom’s password”: unveiling users’ mental models of security and privacy-preserving tools
Dumaru, Prakriti; Shrestha, Ankit; Paudel, Rizu; … - In: Information & Computer Security 32 (2023) 3, pp. 282-303
Purpose The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them as “security tools” in this paper, unless otherwise specified) are designed to protect the security and...
Persistent link: https://www.econbiz.de/10015344457
Saved in:
Cover Image
A look into user privacy andthird-party applications in Facebook
Seng, Sovantharith; Al-Ameen, Mahdi Nasrullah; Wright, … - In: Information & Computer Security 29 (2021) 2, pp. 283-313
Purpose A huge amount of personal and sensitive data are shared on Facebook, which makes it a prime target for attackers. Adversaries can exploit third-party applications connected to a user’s Facebook profiles (i.e. Facebook apps) to gain access to this personal information. Users’ lack of...
Persistent link: https://www.econbiz.de/10014754817
Saved in:
Cover Image
A look into user’s privacy perceptions and data practices of IoT devices
Al-Ameen, Mahdi Nasrullah; Chauhan, Apoorva; Ahsan, … - In: Information & Computer Security 29 (2021) 4, pp. 573-588
Purpose: With the rapid deployment of internet of things (IoT) technologies, it has been essential to address the security and privacy issues through maintaining transparency in data practices. The prior research focused on identifying people's privacy preferences in different contexts of IoT...
Persistent link: https://www.econbiz.de/10012638369
Saved in:
Cover Image
Leveraging autobiographical memory for two-factor online authentication
Al-Ameen, Mahdi Nasrullah; Haque, S.M. Taiabul; Wright, … - In: Information & Computer Security 24 (2016) 4, pp. 386-399
Purpose Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords serve as the first authentication factor, a common approach to implementing the second factor is sending a...
Persistent link: https://www.econbiz.de/10014754620
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...