Hardware security keys undoubtedly have advantage for users as "usabilit...
In this study, we tested users' perception of accuracy and engagement wi...
In this study, we interviewed 22 prominent hacktivists to learn their ta...
The scientific effort devoted to health misinformation mostly focuses on...
In this paper we investigate what folk models of misinformation exist th...
Warning users about misinformation on social media is not a simple usabi...
The COVID-19 pandemic enabled "quishing", or phishing with malicious QR
...
As yet another alternative social network, Gettr positions itself as the...
This paper evaluates Parler, the controversial social media platform, fr...
In this paper, we analyzed the perceived accuracy of COVID-19 vaccine
in...
In this paper, we analyzed the perceived accuracy of COVID-19 vaccine Tw...
This paper presents Out-of-Context Summarizer, a tool that takes arbitra...
Twitter, prompted by the rapid spread of alternative narratives, started...
This paper presents TrollHunter2020, a real-time detection mechanism we ...
This paper presents TrollHunter, an automated reasoning mechanism we use...
This paper presents an automated adversarial mechanism called WikipediaB...
Trolling and social bots have been proven as powerful tactics for
manipu...
Social media trolling is a powerful tactic to manipulate public opinion ...
This paper reports the findings of a study where users (N=220) interacte...
It is an ordinary day working from home, and you are part of a team that...
For two days in February 2018, 17 cybersecurity educators and profession...
In this paper we argue, drawing from the perspectives of cybersecurity a...
This paper explores the factors and theory behind the user-centered rese...
The reach and scale of Cyber Physical Systems (CPS) are expanding to man...
Training the future cybersecurity workforce to respond to emerging threa...