Skip to main content

Showing 1–48 of 48 results for author: Arachchilage, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.05451  [pdf

    cs.CR cs.ET

    PrivacyCube: Data Physicalization for Enhancing Privacy Awareness in IoT

    Authors: Bayan Al Muhander, Nalin Arachchilage, Yasar Majib, Mohammed Alosaimi, Omer Rana, Charith Perera

    Abstract: People are increasingly bringing Internet of Things (IoT) devices into their homes without understanding how their data is gathered, processed, and used. We describe PrivacyCube, a novel data physicalization designed to increase privacy awareness within smart home environments. PrivacyCube visualizes IoT data consumption by displaying privacy-related notices. PrivacyCube aims to assist smart home… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  2. arXiv:2401.13199  [pdf, other

    cs.CR cs.CY cs.HC

    Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions

    Authors: Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar

    Abstract: Despite technical and non-technical countermeasures, humans continue to be tricked by phishing emails. How users make email response decisions is a missing piece in the puzzle to identifying why people still fall for phishing emails. We conducted an empirical study using a think-aloud method to investigate how people make 'response decisions' while reading emails. The grounded theory analysis of t… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

    Journal ref: Symposium on Usable Security and Privacy (USEC) 2024

  3. arXiv:2401.00879  [pdf, other

    cs.SE cs.CY

    SoK: Demystifying Privacy Enhancing Technologies Through the Lens of Software Developers

    Authors: Maisha Boteju, Thilina Ranbaduge, Dinusha Vatsalan, Nalin Asanka Gamagedara Arachchilage

    Abstract: In the absence of data protection measures, software applications lead to privacy breaches, posing threats to end-users and software organisations. Privacy Enhancing Technologies (PETs) are technical measures that protect personal data, thus minimising such privacy breaches. However, for software applications to deliver data protection using PETs, software developers should actively and correctly… ▽ More

    Submitted 30 December, 2023; originally announced January 2024.

  4. arXiv:2310.03292  [pdf, other

    cs.CR cs.AI

    SoK: Access Control Policy Generation from High-level Natural Language Requirements

    Authors: Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello

    Abstract: Administrator-centered access control failures can cause data breaches, putting organizations at risk of financial loss and reputation damage. Existing graphical policy configuration tools and automated policy generation frameworks attempt to help administrators configure and generate access control policies by avoiding such failures. However, graphical policy configuration tools are prone to huma… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: 35 pages

  5. arXiv:2306.07463  [pdf

    cs.CR

    Evaluation of Game Design Framework Using a Gamified Browser-Based Application

    Authors: Abdulrahman Hassan Alhazmi, Nalin Asanka Gamagedara Arachchilage

    Abstract: Privacy Policy under GDPR law helps users understand how software developers handle their personal data. GDPR privacy education must be considered a vital aspect of combating privacy threats. In this paper, we present the design and development of a gamified browser-based application aimed at motivating software developers to enhance their secure coding behavior. To evaluate the proposed game desi… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

    Comments: 6

    Journal ref: Workshop on DGASP'23, co-located with USENIX Symposium on Usable Privacy and Security, SOUPS 2023, AUGUST 6-8, 2023 AN AHEIM, CA, USA

  6. arXiv:2304.00664  [pdf, other

    cs.HC cs.CR

    What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility

    Authors: Sijie Zhuo, Robert Biddle, Lucas Betts, Nalin Asanka Gamagedara Arachchilage, Yun Sing Koh, Danielle Lottridge, Giovanni Russello

    Abstract: Phishing is one of the most prevalent social engineering attacks that targets both organizations and individuals. It is crucial to understand how email presentation impacts users' reactions to phishing attacks. We speculated that the device and email presentation may play a role, and, in particular, that how links are shown might influence susceptibility. Collaborating with the IT Services unit of… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: 12 pages, 3 figures

  7. arXiv:2211.03498  [pdf

    cs.CR

    Developers' Privacy Education: A game framework to stimulate secure coding behaviour

    Authors: Abdulrahman Hassan Alhazmi, Mumtaz Abdul Hameed, Nalin Asanka Gamagedara Arachchilage

    Abstract: Software privacy provides the ability to limit data access to unauthorized parties. Privacy is achieved through different means, such as implementing GDPR into software applications. However, previous research revealed that the lack of poor coding behaviour leads to privacy breaches such as personal data breaching. Therefore, this research proposes a novel game framework as a training intervention… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Comments: 10

    Journal ref: The 2022 IEEE International Conference on Privacy Computing (IEEE PriComp 2022)

  8. arXiv:2210.02650  [pdf, other

    cs.CR

    PrivacyCube: A Tangible Device for Improving Privacy Awareness in IoT

    Authors: Bayan Al Muhander, Omer Rana, Nalin Arachchilage, Charith Perera

    Abstract: Consumers increasingly bring IoT devices into their living spaces without understanding how their data is collected, processed, and used. We present PrivacyCube, a novel tangible device designed to explore the extent to which privacy awareness in smart homes can be elevated. PrivacyCube visualises IoT devices' data consumption displaying privacy-related notices. PrivacyCube aims at assisting famil… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: In Proceedings of the 2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI) 2022

  9. arXiv:2108.04766  [pdf

    cs.CR cs.CY cs.HC

    Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors

    Authors: Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar

    Abstract: Despite sophisticated phishing email detection systems, and training and awareness programs, humans continue to be tricked by phishing emails. In an attempt to better understand why phishing email attacks still work and how best to mitigate them, we have carried out an empirical study to investigate people's thought processes when reading their emails. We used a scenario-based role-play "think alo… ▽ More

    Submitted 6 October, 2021; v1 submitted 10 August, 2021; originally announced August 2021.

    Comments: The 42nd International Conference on Information Systems (ICIS'21), Austin, Texas, USA, 2021, 17

    Journal ref: The 42nd International Conference on Information Systems (ICIS'21), Austin, Texas, USA, 2021, 17

  10. arXiv:2103.01371  [pdf

    cs.CR cs.HC cs.SE

    I'm all Ears! Listening to Software Developers on Putting GDPR Principles into Software Development Practice

    Authors: Abdulrahman Alhazmi, Nalin Asanka Gamagedara Arachchilage

    Abstract: Previous research has been carried out to identify the impediments that prevent developers from incorporating privacy protocols into software applications. No research has been carried out to find out why developers are not able to develop systems that preserve-privacy while specifically considering the General Data Protection Regulation principles (GDPR principles). Consequently, this paper aims… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

    Comments: 18

    Journal ref: Personal and Ubiquitous Computing, Springer, 2021

  11. Designing a Serious Game: Teaching Developers to Embed Privacy into Software Systems

    Authors: Nalin Asanka Gamagedara Arachchilage, Mumtaz Abdul Hameed

    Abstract: Software applications continue to challenge user privacy when users interact with them. Privacy practices (e.g. Data Minimisation (DM), Privacy by Design (PbD) or General Data Protection Regulation (GDPR)) and related "privacy engineering" methodologies exist and provide clear instructions for developers to implement privacy into software systems they develop that preserve user privacy. However, t… ▽ More

    Submitted 11 September, 2020; originally announced September 2020.

    Comments: 6

    Journal ref: 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW '20), September 25, 2020, Virtual Event, Australia. ACM, New York, NY, USA

  12. arXiv:2008.02987  [pdf

    cs.CR cs.CY

    Why are Developers Struggling to Put GDPR into Practice when Develo** Privacy-Preserving Software Systems?

    Authors: Abdulrahman Alhazmi, Nalin Asanka Gamagedara Arachchilage

    Abstract: The use of software applications is inevitable as they provide different services to users. The software applications collect, store users' data, and sometimes share with the third party, even without the user consent. One can argue that software developers do not implement privacy into the software applications they develop or take GDPR (General Data Protection Law) law into account. Failing to d… ▽ More

    Submitted 7 August, 2020; originally announced August 2020.

    Comments: 5

    Journal ref: USENIX Symposium on Usable Privacy and Security (SOUPS) 2020. August 9 -- 11, 2020, Boston, MA, USA

  13. arXiv:2007.00489  [pdf

    cs.CR

    Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach

    Authors: J. Samantha Tharani, Nalin Asanka Gamagedara Arachchilage

    Abstract: Phishing is a type of social engineering attack with an intention to steal user data, including login credentials and credit card numbers, leading to financial losses for both organisations and individuals. It occurs when an attacker, pretending as a trusted entity, lure a victim into click on a link or attachment in an email, or in a text message. Phishing is often launched via email messages or… ▽ More

    Submitted 1 July, 2020; originally announced July 2020.

    Comments: 15

    Journal ref: Security and Privacy, Willey, 2020

  14. arXiv:2004.13262  [pdf

    cs.CR

    Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks?

    Authors: Matheesha Fernando, Nalin Asanka Gamagedara Arachchilage

    Abstract: Phishing is a way of stealing people's sensitive information such as username, password and banking details by disguising as a legitimate entity (i.e. email, website). Anti-phishing education considered to be vital in strengthening "human", the weakest link in information security. Previous research in anti-phishing education focuses on improving educational interventions to better interact the en… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

    Comments: 12

    Journal ref: Australasian Conference on Information Systems, Perth, 2019

  15. arXiv:1908.09210  [pdf

    cs.CR cs.CY

    That's Not Me! Designing Fictitious Profiles to Answer Security Questions

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: Although security questions are still widely adopted, they still have several limitations. Previous research found that using system-generated information to answer security questions could be more secure than users' own answers. However, using system-generated information has usability limitations. To improve usability, previous research proposed the design of system-generated fictitious profiles… ▽ More

    Submitted 24 August, 2019; originally announced August 2019.

    Comments: 5

    Journal ref: USENIX Symposium on Usable Privacy and Security (SOUPS), August 11-13, 2019 Santa Clara, CA, USA

  16. On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations

    Authors: Mumtaz Abdul Hameed, Nalin Asanka Gamagedara Arachchilage

    Abstract: A number of determinants predict the adoption of Information Systems (IS) security innovations. Amongst, perceived vulnerability of IS security threats has been examined in a number of past explorations. In this research, we examined the processes pursued in analysing the relationship between perceived vulnerability of IS security threats and the adoption of IS security innovations. The study uses… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 10. arXiv admin note: text overlap with arXiv:1809.10890

    Journal ref: International Journal of Computer Network and Information Security(IJCNIS), 2019

  17. arXiv:1903.03019  [pdf

    cs.CY

    Engaging Users with Educational Games: The Case of Phishing

    Authors: Matt Dixon, Nalin Asanka Gamagedara Arachchilage, James Nicholson

    Abstract: Phishing continues to be a difficult problem for individuals and organisations. Educational games and simulations have been increasingly acknowledged as enormous and powerful teaching tools, yet little work has examined how to engage users with these games. We explore this problem by conducting workshops with 9 younger adults and reporting on their expectations for cybersecurity educational games.… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

    Comments: 4

    Journal ref: CHI '19 Extended Abstracts on Human Factors in Computing Systems Proceedings (CHI 2019), 2019

  18. arXiv:1811.09024  [pdf

    cs.CR

    Building Confidence not to be Phished through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour

    Authors: Gitanjali Baral, Nalin Asanka Gamagedara Arachchilage

    Abstract: Phishing attacks are prevalent and humans are central to this online identity theft attack, which aims to steal victims' sensitive and personal information such as username, password, and online banking details. There are many anti-phishing tools developed to thwart against phishing attacks. Since humans are the weakest link in phishing, it is important to educate them to detect and avoid phishing… ▽ More

    Submitted 22 November, 2018; originally announced November 2018.

    Comments: 15

    Journal ref: International Conferences on Cyber Security and Communication Systems (ICCSCS2018), 2018

  19. arXiv:1810.05100  [pdf

    cs.CR cs.HC

    A methodology to Evaluate the Usability of Security APIs

    Authors: Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage

    Abstract: Increasing number of cyber-attacks demotivate people to use Information and Communication Technology (ICT) for industrial as well as day to day work. A main reason for the increasing number of cyber-attacks is mistakes that programmers make while develo** software applications that are caused by usability issues exist in security Application Programming Interfaces (APIs). These mistakes make sof… ▽ More

    Submitted 11 October, 2018; originally announced October 2018.

    Comments: 6

    Journal ref: IEEE International Conference on Information and Automation for Sustainability (ICIAfS), 2019

  20. arXiv:1810.01017  [pdf

    cs.CR

    Fighting Against XSS Attacks: A Usability Evaluation of OWASP ESAPI Output Encoding

    Authors: Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage

    Abstract: Cross Site Scripting (XSS) is one of the most critical vulnerabilities exist in web applications. XSS can be prevented by encoding untrusted data that are loaded into browser content of web applications. Security Application Programming Interfaces (APIs) such as OWASP ESAPI provide output encoding functionalities for programmers to use to protect their applications from XSS attacks. However, XSS s… ▽ More

    Submitted 1 October, 2018; originally announced October 2018.

    Comments: 10

    Journal ref: The 52nd Hawaii International Conference on System Sciences (HICSS), 2019

  21. arXiv:1809.10890  [pdf

    cs.CR

    Understanding the influence of Individual's Self-efficacy for Information Systems Security Innovation Adoption: A Systematic Literature Review

    Authors: Mumtaz Abdul Hameed, Nalin Asanka Gamagedara Arachchilage

    Abstract: Information Systems security cannot be fully apprehended if the user lacks the required knowledge and skills to effectively apply the safeguard measures. Knowledge and skills enhance one's self-efficacy. Individual self-efficacy is an important element in ensuring Information Systems safeguard effectiveness. In this research, we explore the role of individual's self-efficacy for Information System… ▽ More

    Submitted 28 September, 2018; originally announced September 2018.

    Comments: 19

    Journal ref: 17th Australian Cyber Warfare Conference (CWAR), October 10-11th, 2018, Melbourne, Victoria, Australia

  22. arXiv:1809.10884  [pdf

    cs.CR

    A model for system developers to measure the privacy risk of data

    Authors: Awanthika Senarath, Marthie Grobler, Nalin Asanka Gamagedara Arachchilage

    Abstract: In this paper, we propose a model that could be used by system developers to measure the privacy risk perceived by users when they disclose data into software systems. We first derive a model to measure the perceived privacy risk based on existing knowledge and then we test our model through a survey with 151 participants. Our findings revealed that users' perceived privacy risk monotonically incr… ▽ More

    Submitted 28 September, 2018; originally announced September 2018.

    Comments: 10

    Journal ref: The 52nd Hawaii International Conference on System Sciences (HICSS), 2019

  23. arXiv:1808.01481  [pdf

    cs.CR cs.CY

    Am I Responsible for End-User's Security? A Programmer's Perspective

    Authors: Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage

    Abstract: Previous research has pointed that software applications should not depend on programmers to provide security for end-users as majority of programmers are not experts of computer security. On the other hand, some studies have revealed that security experts believe programmers have a major role to play in ensuring the end-users' security. However, there has been no investigation on what programmers… ▽ More

    Submitted 4 August, 2018; originally announced August 2018.

    Comments: 4, USENIX Symposium on Usable Privacy and Security (SOUPS), August 12 14 Baltimore, MD, USA,2018

  24. arXiv:1808.01479  [pdf

    cs.CR cs.CY cs.SE

    Understanding Software Developers' Approach towards Implementing Data Minimization

    Authors: Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage

    Abstract: Data Minimization (DM) is a privacy practice that requires minimizing the use of user data in software systems. However, continuous privacy incidents that compromise user data suggest that the requirements of DM are not adequately implemented in software systems. Therefore, it is important that we understand the problems faced by software developers when they attempt to implement DM in software sy… ▽ More

    Submitted 4 August, 2018; originally announced August 2018.

    Comments: 4, USENIX Symposium on Usable Privacy and Security (SOUPS), August 12 14 Baltimore, MD, USA,2018

  25. arXiv:1805.09487  [pdf

    cs.CR

    Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncycastle Password Hashing

    Authors: Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage

    Abstract: Lack of usability of security Application Programming In- terfaces (APIs) is one of the main reasons for mistakes that programmers make that result in security vulnerabilities in software applications they develop. Especially, APIs that pro- vide cryptographic functionalities such as password hashing are sometimes too complex for programmers to learn and use. To improve the usability of these APIs… ▽ More

    Submitted 23 May, 2018; originally announced May 2018.

    Comments: 6

    Journal ref: 22nd International Conference on Evaluation and Assessment in Software Engineering, 2018

  26. arXiv:1805.09485  [pdf

    cs.SE cs.CR cs.CY

    Why developers cannot embed privacy into software systems? An empirical investigation

    Authors: Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage

    Abstract: Pervasive use of software applications continues to challenge user privacy when users interact with software systems. Even though privacy practices such as Privacy by Design (PbD), have clear in- structions for software developers to embed privacy into software designs, those practices are yet to become a common practice among software developers. The difficulty of develo** privacy preserv- ing… ▽ More

    Submitted 24 May, 2018; v1 submitted 23 May, 2018; originally announced May 2018.

    Comments: 6

    Journal ref: 22nd International Conference on Evaluation and Assessment in Software Engineering, 2018

  27. arXiv:1710.06064  [pdf

    cs.CR cs.CY

    Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

    Authors: Gaurav Misra, Nalin Asanka Gamagedara Arachchilage, Shlomo Berkovsky

    Abstract: Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability. Phishing attacks can be used to gather sensitive information from victims and can have devastating impact if they are successful in deceiving the user. Several anti-phishing tools have bee… ▽ More

    Submitted 16 October, 2017; originally announced October 2017.

    Comments: 11

    Journal ref: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017)

  28. arXiv:1710.03890  [pdf

    cs.CR cs.CY

    Understanding Organizational Approach towards End User Privacy

    Authors: Awanthika Rasanjalee Senarath, Nalin Asanka Gamagedara Arachchilage

    Abstract: End user privacy is a critical concern for all organizations that collect, process and store user data as a part of their business. Privacy concerned users, regulatory bodies and privacy experts continuously demand organizations provide users with privacy protection. Current research lacks an understanding of organizational characteristics that affect an organization's motivation towards user priv… ▽ More

    Submitted 10 October, 2017; originally announced October 2017.

    Comments: 12

    Journal ref: Australasian Conference on Information Systems, 2017, Hobart, Australia

  29. arXiv:1710.03888  [pdf

    cs.CR cs.CY cs.HC

    Involving Users in the Design of a Serious Game for Security Questions Education

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: When using security questions most users still trade-off security for the convenience of memorability. This happens because most users find strong answers to security questions difficult to remember. Previous research in security education was successful in motivating users to change their behaviour towards security issues, through the use of serious games (i.e. games designed for a primary purpos… ▽ More

    Submitted 10 October, 2017; originally announced October 2017.

    Comments: 10; International Symposium on Human Aspects of Information Security & Assurance (HAISA), 2017

  30. arXiv:1709.08623  [pdf

    cs.CR cs.HC

    Changing users' security behaviour towards security questions: A game based learning approach

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: Fallback authentication is used to retrieve forgotten passwords. Security questions are one of the main techniques used to conduct fallback authentication. In this paper, we propose a serious game design that uses system-generated security questions with the aim of improving the usability of fallback authentication. For this purpose, we adopted the popular picture-based "4 Pics 1 word" mobile game… ▽ More

    Submitted 24 September, 2017; originally announced September 2017.

    Comments: 6, Military Communications and Information Systems Conference (MilCIS), 2017. arXiv admin note: substantial text overlap with arXiv:1707.08073

  31. arXiv:1709.08167  [pdf

    cs.CR cs.HC

    A Serious Game Design: Nudging Users' Memorability of Security Questions

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: Security questions are one of the techniques used to recover passwords. The main limitation of security questions is that users find strong answers difficult to remember. This leads users to trade-off security for the convenience of an improved memorability. Previous research found that increased fun and enjoyment can lead to an enhanced memorability, which provides a better learning experience. H… ▽ More

    Submitted 24 September, 2017; originally announced September 2017.

    Comments: 11, Australasian Conference on Information Systems, 2017

  32. arXiv:1709.08165  [pdf

    cs.CR cs.HC

    A Model for Enhancing Human Behaviour with Security Questions: A Theoretical Perspective

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: Security questions are one of the mechanisms used to recover passwords. Strong answers to security questions (i.e. high entropy) are hard for attackers to guess or obtain using social engineering techniques (e.g. monitoring of social networking profiles), but at the same time are difficult to remember. Instead, weak answers to security questions (i.e. low entropy) are easy to remember, which makes… ▽ More

    Submitted 24 September, 2017; originally announced September 2017.

    Comments: 11, Australasian Conference on Information Systems, 2017

  33. arXiv:1707.08073  [pdf

    cs.CR cs.HC

    A Gamified Approach to Improve Users' Memorability of Fall-back Authentication

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: Security questions are one of the techniques used in fall-back authentication to retrieve forgotten passwords. This paper proposes a game design which aims to improve usability of system-generated security questions. In our game design, we adapted the popular picture-based "4 Pics 1 word" mobile game. This game asks users to pick the word that relates the given pictures. We selected this game beca… ▽ More

    Submitted 25 July, 2017; originally announced July 2017.

    Comments: 6

    Journal ref: Symposium on Usable Privacy and Security SOUPS 2017, July, 2017, Santa Clara, California

  34. arXiv:1706.07748  [pdf, other

    cs.CR cs.CY

    Integrating self-efficacy into a gamified approach to thwart phishing attacks

    Authors: Nalin Asanka Gamagedara Arachchilage, Mumtaz Abdul Hameed

    Abstract: Security exploits can include cyber threats such as computer programs that can disturb the normal behavior of computer systems (viruses), unsolicited e-mail (spam), malicious software (malware), monitoring software (spyware), attempting to make computer resources unavailable to their intended users (Distributed Denial-of-Service or DDoS attack), the social engineering, and online identity theft (p… ▽ More

    Submitted 23 June, 2017; originally announced June 2017.

    Comments: 6 pages, 3 figures, 5th International Conference on Cybercrime and Computer Forensics (ICCCF), IEEE, Sofitel Gold Coast Broadbeach on 16-18 July 2017

  35. arXiv:1706.00138  [pdf

    cs.CR cs.HC

    Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs

    Authors: Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage, Jill Slay

    Abstract: Usability issues that exist in security APIs cause programmers to embed those security APIs incorrectly to the applications they develop. This results in introduction of security vulnerabilities to those applications. One of the main reasons for security APIs to be not usable is currently there is no proper method by which the usability issues of security APIs can be identified. We conducted a stu… ▽ More

    Submitted 11 June, 2017; v1 submitted 31 May, 2017; originally announced June 2017.

    Comments: 4, 28th Annual Workshop of the Psychology of Programming Interest Group (PPIG), Delft, Netherlands, 2017

  36. arXiv:1705.09819  [pdf

    cs.CR

    Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions

    Authors: B. B. Gupta, Nalin Asanka Gamagedara Arachchilage, Konstantinos E. Psannis

    Abstract: Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people's lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is "phishing", in which, attackers attempt to steal the user's credentials using fake emails or websites or both. It… ▽ More

    Submitted 27 May, 2017; originally announced May 2017.

    Comments: 32, Telecommunication Systems, Springer, 2017

  37. arXiv:1704.03867  [pdf

    cs.CR cs.CY

    A Conceptual Model for the Organisational Adoption of Information System Security Innovations

    Authors: Mumtaz Abdul Hameed, Nalin Asanka Gamagedara Arachchilage

    Abstract: Information System (IS) Security threats is still a major concern for many organisations. However, most organisations fall short in achieving a successful adoption and implementation of IS security measures. In this paper, we developed a theoretical model for the adoption process of IS Security innovations in organisations. The model was derived by combining four theoretical models of innovation a… ▽ More

    Submitted 4 May, 2017; v1 submitted 12 April, 2017; originally announced April 2017.

    Comments: 38 pages. arXiv admin note: substantial text overlap with arXiv:1609.07911

  38. arXiv:1703.09847  [pdf

    cs.HC cs.CR cs.CY

    Designing Privacy for You : A User Centric Approach For Privacy

    Authors: Awanthika Senarath, Nalin A. G. Arachchilage, Jill Slay

    Abstract: Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a user- centered manner. Through this research we propose a framework th… ▽ More

    Submitted 17 April, 2017; v1 submitted 28 March, 2017; originally announced March 2017.

    Comments: 14 pages, HCI International 2017 Vancouver, Canada

  39. arXiv:1703.09846  [pdf

    cs.CR cs.CY

    A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs

    Authors: Chamila Wijayarathna, Nalin A. G. Arachchilage, Jill Slay

    Abstract: Programmers use security APIs to embed security into the applications they develop. Security vulnerabilities get introduced into those applications, due to the usability issues that exist in the security APIs. Improving usability of security APIs would contribute to improve the security of applications that programmers develop. However, currently there is no methodology to evaluate the usability o… ▽ More

    Submitted 28 March, 2017; originally announced March 2017.

    Comments: 14 pages, 19th International Conference on Human-Computer Interaction (HCII)

  40. arXiv:1701.03229  [pdf

    cs.CR

    Security Strength Indicator in Fallback Authentication: Nudging Users for Better Answers in Secret Questions

    Authors: Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage, B. B. Gupta

    Abstract: In this paper, we describe ongoing work that focuses on improving the strength of the answers to security questions. The ultimate goal of the proposed research is to evaluate the possibility of nudging users towards strong answers for ubiquitous security questions. In this research we are proposing a user interface design for fallback authentication to encourage users to design stronger answers. T… ▽ More

    Submitted 11 January, 2017; originally announced January 2017.

    Comments: 5 pages in International Journal for Infonomics (IJI), 2016

  41. arXiv:1610.09511  [pdf

    cs.CY cs.CR

    Serious Games for Cyber Security Education

    Authors: Nalin Asanka Gamagedara Arachchilage

    Abstract: Phishing is an online identity theft that aims to steal sensitive information such as username, passwords and online banking details from its victims. Phishing education needs to be considered as a means to combat this threat. This book focuses on a design and development of a mobile game prototype as an educational tool hel** computer users to protect themselves against phishing attacks. The el… ▽ More

    Submitted 29 October, 2016; originally announced October 2016.

    Comments: 244, LAP LAMBERT Academic Publishing, 2016

  42. arXiv:1609.07911  [pdf

    cs.CY cs.CR

    A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective

    Authors: Mumtaz Abdul Hameed, Nalin Asanka Gamagedara Arachchilage

    Abstract: In this paper, we develop a theoretical model for the adoption process of Information System Security innovations in organisations. The model stemmed from the Diffusion of Innovation theory (DOI), the Technology Acceptance Model (TAM), the Theory of Planned Behaviour (TPB) and the Technology-Organisation-Environment (TOE) framework. The model portrays Information System Security adoption process p… ▽ More

    Submitted 26 September, 2016; originally announced September 2016.

    Comments: 12, The 27th Australasian Conference on Information Systems 2016, Australia

  43. arXiv:1602.03929  [pdf

    cs.CY cs.CR

    Designing a Mobile Game for Home Computer Users to Protect Against Phishing Attacks

    Authors: Nalin Asanka Gamagedara Arachchilage, Melissa Cole

    Abstract: This research aims to design an educational mobile game for home computer users to prevent from phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The p… ▽ More

    Submitted 11 February, 2016; originally announced February 2016.

    Comments: 8 in International Journal for e-Learning Security (IJeLS), Volume 1, Issue 1/2, March/June 2011. arXiv admin note: substantial text overlap with arXiv:1511.07093

  44. arXiv:1512.06307  [pdf

    cs.CR

    Develo** a Trust Domain Taxonomy for Securely Sharing Information Among Others

    Authors: Nalin Asanka Gamagedara Arachchilage, Cornelius Namiluko, Andrew Martin

    Abstract: In any given collaboration, information needs to flow from one participant to another. While participants may be interested in sharing information with one another, it is often necessary for them to establish the impact of sharing certain kinds of information. This is because certain information could have detrimental effects when it ends up in wrong hands. For this reason, any would-be participan… ▽ More

    Submitted 19 December, 2015; originally announced December 2015.

    Comments: 10, International Journal for Information Security Research (IJISR), Volume 3 Issues 1/2, ISSN 2042-4639 (2013). arXiv admin note: text overlap with arXiv:1511.04541

  45. arXiv:1511.07093  [pdf

    cs.CY cs.CR

    Designing a mobile game to thwarts malicious IT threats: A phishing threat avoidance perspective

    Authors: Nalin Asanka Gamagedara Arachchilage, Ali Tarhini, Steve Love

    Abstract: Phishing is an online identity theft, which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Game based education is becoming more and more popular. This paper introduces a mobile game prototype for the android platform based on a story, which simplifies and exaggerates real life. The… ▽ More

    Submitted 22 November, 2015; originally announced November 2015.

    Comments: 9, International Journal for Infonomics (IJI), Volume 8 Issues 3/4, September/December 2015. arXiv admin note: text overlap with arXiv:1511.01622

  46. arXiv:1511.04541  [pdf

    cs.CR

    A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation

    Authors: Nalin Asanka Gamagedara Arachchilage, Andrew Martin

    Abstract: Information sharing has become a vital part in our day-to-day life due to the pervasiveness of Internet technology. In any given collaboration, information needs to flow from one participant to another. While participants may be interested in sharing information with one another, it is often necessary for them to establish the impact of sharing certain kinds of information. This is because certain… ▽ More

    Submitted 7 January, 2016; v1 submitted 14 November, 2015; originally announced November 2015.

    Comments: 16, Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014)

  47. arXiv:1511.03459  [pdf, other

    cs.CY

    User-Centred Security Education: A Game Design to Thwart Phishing Attacks

    Authors: Nalin Asanka Gamagedara Arachchilage

    Abstract: Phishing is an online identity theft that aims to steal sensitive information such as username, password and online banking details from its victims. Phishing education needs to be considered as a means to combat this threat. This paper reports on a design and development of a mobile game prototype as an educational tool hel** computer users to protect themselves against phishing attacks. The el… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    Comments: 3 pages, International Conference: Redefining the R&D Needs for Australian Cyber Security on November 16, 2015

  48. arXiv:1511.01622  [pdf

    cs.CY cs.CR cs.HC

    Can a Mobile Game Teach Computer Users to Thwart Phishing Attacks?

    Authors: Nalin Asanka Gamagedara Arachchilage, Steve Love, Carsten Maple

    Abstract: Phishing is an online fraudulent technique, which aims to steal sensitive information such as usernames, passwords and online banking details from its victims. To prevent this, anti-phishing education needs to be considered. This research focuses on examining the effectiveness of mobile game based learning compared to traditional online learning to thwart phishing threats. Therefore, a mobile game… ▽ More

    Submitted 5 November, 2015; originally announced November 2015.

    Comments: 11 pages

    Journal ref: International Journal for Infonomics (IJI), Volume 6, Issues 3/4, ISSN: 1742 4712, pp. 720-730 (2013)