Skip to main content

Showing 1–9 of 9 results for author: Micallef, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2011.05773  [pdf, ps, other

    cs.SI cs.CL cs.CY

    The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic

    Authors: Nicholas Micallef, Bing He, Srijan Kumar, Mustaque Ahamad, Nasir Memon

    Abstract: Fact checking by professionals is viewed as a vital defense in the fight against misinformation.While fact checking is important and its impact has been significant, fact checks could have limited visibility and may not reach the intended audience, such as those deeply embedded in polarized communities. Concerned citizens (i.e., the crowd), who are users of the platforms where misinformation appea… ▽ More

    Submitted 11 November, 2020; v1 submitted 11 November, 2020; originally announced November 2020.

    Comments: PrePrint - IEEE BigData 2020. The code and data can be found in http://claws.cc.gatech.edu/covid_counter_misinformation.html

  2. Exposure to Social Engagement Metrics Increases Vulnerability to Misinformation

    Authors: Mihai Avram, Nicholas Micallef, Sameer Patil, Filippo Menczer

    Abstract: News feeds in virtually all social media platforms include engagement metrics, such as the number of times each post is liked and shared. We find that exposure to these social engagement signals increases the vulnerability of users to misinformation. This finding has important implications for the design of social media interactions in the misinformation age. To reduce the spread of misinformation… ▽ More

    Submitted 28 May, 2020; v1 submitted 10 May, 2020; originally announced May 2020.

    Comments: 9 pages, 2 figures

    Journal ref: HKS Misinformation Review Vol. 1 (No. 5), 2020

  3. arXiv:1908.09210  [pdf

    cs.CR cs.CY

    That's Not Me! Designing Fictitious Profiles to Answer Security Questions

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: Although security questions are still widely adopted, they still have several limitations. Previous research found that using system-generated information to answer security questions could be more secure than users' own answers. However, using system-generated information has usability limitations. To improve usability, previous research proposed the design of system-generated fictitious profiles… ▽ More

    Submitted 24 August, 2019; originally announced August 2019.

    Comments: 5

    Journal ref: USENIX Symposium on Usable Privacy and Security (SOUPS), August 11-13, 2019 Santa Clara, CA, USA

  4. arXiv:1710.03888  [pdf

    cs.CR cs.CY cs.HC

    Involving Users in the Design of a Serious Game for Security Questions Education

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: When using security questions most users still trade-off security for the convenience of memorability. This happens because most users find strong answers to security questions difficult to remember. Previous research in security education was successful in motivating users to change their behaviour towards security issues, through the use of serious games (i.e. games designed for a primary purpos… ▽ More

    Submitted 10 October, 2017; originally announced October 2017.

    Comments: 10; International Symposium on Human Aspects of Information Security & Assurance (HAISA), 2017

  5. arXiv:1709.08623  [pdf

    cs.CR cs.HC

    Changing users' security behaviour towards security questions: A game based learning approach

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: Fallback authentication is used to retrieve forgotten passwords. Security questions are one of the main techniques used to conduct fallback authentication. In this paper, we propose a serious game design that uses system-generated security questions with the aim of improving the usability of fallback authentication. For this purpose, we adopted the popular picture-based "4 Pics 1 word" mobile game… ▽ More

    Submitted 24 September, 2017; originally announced September 2017.

    Comments: 6, Military Communications and Information Systems Conference (MilCIS), 2017. arXiv admin note: substantial text overlap with arXiv:1707.08073

  6. arXiv:1709.08167  [pdf

    cs.CR cs.HC

    A Serious Game Design: Nudging Users' Memorability of Security Questions

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: Security questions are one of the techniques used to recover passwords. The main limitation of security questions is that users find strong answers difficult to remember. This leads users to trade-off security for the convenience of an improved memorability. Previous research found that increased fun and enjoyment can lead to an enhanced memorability, which provides a better learning experience. H… ▽ More

    Submitted 24 September, 2017; originally announced September 2017.

    Comments: 11, Australasian Conference on Information Systems, 2017

  7. arXiv:1709.08165  [pdf

    cs.CR cs.HC

    A Model for Enhancing Human Behaviour with Security Questions: A Theoretical Perspective

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: Security questions are one of the mechanisms used to recover passwords. Strong answers to security questions (i.e. high entropy) are hard for attackers to guess or obtain using social engineering techniques (e.g. monitoring of social networking profiles), but at the same time are difficult to remember. Instead, weak answers to security questions (i.e. low entropy) are easy to remember, which makes… ▽ More

    Submitted 24 September, 2017; originally announced September 2017.

    Comments: 11, Australasian Conference on Information Systems, 2017

  8. arXiv:1707.08073  [pdf

    cs.CR cs.HC

    A Gamified Approach to Improve Users' Memorability of Fall-back Authentication

    Authors: Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

    Abstract: Security questions are one of the techniques used in fall-back authentication to retrieve forgotten passwords. This paper proposes a game design which aims to improve usability of system-generated security questions. In our game design, we adapted the popular picture-based "4 Pics 1 word" mobile game. This game asks users to pick the word that relates the given pictures. We selected this game beca… ▽ More

    Submitted 25 July, 2017; originally announced July 2017.

    Comments: 6

    Journal ref: Symposium on Usable Privacy and Security SOUPS 2017, July, 2017, Santa Clara, California

  9. arXiv:1410.7743  [pdf

    cs.CR

    Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors

    Authors: Hilmi Gunes Kayacik, Mike Just, Lynne Baillie, David Aspinall, Nicholas Micallef

    Abstract: We propose a lightweight, and temporally and spatially aware user behaviour modelling technique for sensor-based authentication. Operating in the background, our data driven technique compares current behaviour with a user profile. If the behaviour deviates sufficiently from the established norm, actions such as explicit authentication can be triggered. To support a quick and lightweight deploymen… ▽ More

    Submitted 28 October, 2014; originally announced October 2014.

    Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.longhoe.net/abs/1410.6674)

    Report number: MoST/2014/01