Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 22, Issue 5Sept.-Oct. 2024Current Issue
Publisher:
  • IEEE Educational Activities Department
  • 445 Hoes Lane P.O. Box 1331 Piscataway, NJ
  • United States
ISSN:1540-7993
Reflects downloads up to 09 Dec 2024Bibliometrics
Skip Table Of Content Section
opinion
Has Access Control Become the Weak Link?

In the early 2000s, computer systems were under threat from a variety of Internet worms. This malware attacked network-facing programs by exploiting their memory errors, hijacking their execution to perform malicious operations and propagate the malware ...

opinion
Inclusive Privacy and Security

This special issue features six articles on addressing the privacy and security needs of diverse populations. These articles provide insights into design guidelines, techniques, and specific populations for building technologies for inclusive privacy and ...

research-article
Inclusive Involvement of At-Risk Users in Cybersecurity Research

This article outlines an approach to assist cybersecurity research involving excluded at-risk users or those whose needs are overlooked. Attention is devoted to “ethics in practice” as an enabler of inclusive experimentation accounting for “human ...

research-article
Advocating a Policy Push Toward Inclusive and Secure “Digital-First” Societies

Policy pushes are essential in furthering moral needs; this also applies to inclusive security and privacy. Sen's capability approach is ideally placed to frame inclusive cybersecurity policies to facilitate an equitable and secure digital-first society.

research-article
Inclusive Internet of Things Privacy Labels

Internet of Things (IoT) privacy labels present an opportunity for consumers to learn about the security and privacy of IoT devices, but they must be inclusive and serve all users in a manner that is accessible and valuable.

research-article
The Art of Inclusive Gamification in Cybersecurity Training

We emphasize the importance of inclusiveness in gamified cybersecurity education and training. By exploring current strategies and conducting an empirical study, we derived key design principles for promoting inclusive gamification, which are crucial for ...

research-article
Open Access
It&#x2019;s Still Complicated: <bold>From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience</bold>

We discuss the paradigm shift from restrictive approaches toward resilience-based solutions to promote adolescents’ online safety and well-being. We describe how restrictive strategies induce a tradeoff between teens’ privacy and online safety and present ...

research-article
Understanding Phishing Experiences of Screen Reader Users

Current phishing countermeasures depend strongly on vision, often inadequate for screen reader users. We conducted 10 semistructured interviews and 14 lab-based sessions with screen reader users to understand their phishing experiences and defenses.

research-article
Open Access
AI Code Generators for Security: Friend or Foe?

Recent advances of artificial intelligence (AI) code generators are opening new opportunities in software security research, including misuse by malicious actors. We review use cases for AI code generators for security and introduce an evaluation ...

research-article
Open Access
The Rocky Road to Sustainable Security

In this column, we illustrate real-world scenarios in which modern systems cannot preserve security during operation. We examine the notion of sustainable security and discuss the challenges to engineering sustainably secure systems.

research-article
Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study

Organizations worldwide face challenges in recruiting personnel with the necessary cybersecurity knowledge due to a global skills shortage. This article analyzes four knowledge frameworks—CyBOK, CSEC2017, NICE, and CST to guide educators, curriculum ...

research-article
Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things

This article explores the integration of shared responsibility and zero trust architecture models to enhance the cybersecurity of Industrial Internet of Things (IIoT) systems. It examines the foundational principles and challenges of each model, ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.