U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Human-Centered Cybersecurity

Research Areas

We conduct research in the following areas:

  • Authentication – evaluating the usability of passwords, password policies, and other authentication mechanisms
  • Cryptography– exploring the practices, challenges, and usability of resources (e.g., standards, libraries, and certifications) related to the development and testing of secure cryptographic software and hardware products
  • Cybersecurity Adoption, Awareness, and Training – discovering security advocacy and training approaches that result in users making sound security decisions and adopting security best practices
  • Internet of Things – exploring end users' perceptions of and experience with smart home security and privacy
  • Phishing– understanding why people do or do not fall victim to phishing attacks and how to measure the difficulty level of phishing emails
  • Privacy – investigating usable methods for ensuring the protection of personal and sensitive information
  • User Perceptions & Behaviors – uncovering the beliefs, perceptions, and other factors influencing users’ security and privacy behaviors
  • Youth Security and Privacy - exploring the online security and privacy perceptions and practices of youth and influencing social factors from three perspectives: youth themselves, parents/guardians, and teachers/educators

Created November 17, 2016, Updated August 25, 2023