Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Iacovos Kirlappos is active.

Publication


Featured researches published by Iacovos Kirlappos.


financial cryptography | 2013

“Comply or Die” Is Dead: Long Live Security-Aware Principal Agents

Iacovos Kirlappos; Adam Beautement; M. Angela Sasse

Information security has adapted to the modern collaborative organisational nature, and abandoned “command-and-control” approaches of the past. But when it comes to managing employee’s information security behaviour, many organisations still use policies proscribing behaviour and sanctioning non-compliance. Whilst many organisations are aware that this “comply or die” approach does not work for modern enterprises where employees collaborate, share, and show initiative, they do not have an alternative approach to fostering secure behaviour. We present an interview analysis of 126 employees’ reasons for not complying with organisational policies, identifying the perceived conflict of security with productive activities as the key driver for non-compliance and confirm the results using a survey of 1256 employees. We conclude that effective problem detection and security measure adaptation needs to be de-centralised - employees are the principal agents who must decide how to implement security in specific contexts. But this requires a higher level of security awareness and skills than most employees currently have. Any campaign aimed at security behaviour needs to transform employee’s perception of their role in security, transforming them to security-aware principal agents.


international conference on human-computer interaction | 2013

Towards Usable Generation and Enforcement of Trust Evidence from Programmers’ Intent

Michael Huth; Jim Huan-Pu Kuo; M. Angela Sasse; Iacovos Kirlappos

Programmers develop code with a sense of purpose and with expectations on how units of code should interact with other units of code. But this intent of programmers is typically implicit and undocumented, goes beyond considerations of functional correctness, and may depend on trust assumptions that programmers make. At present, neither programming languages nor development environments offer a means of articulating such intent in a manner that could be used for controlling whether software executions meet such intentions and their associated expectations. We here study how extant research on trust can inform approaches to articulating programmers’ intent so that it may help with creating trust evidence for more trustworthy interaction of software units.


international conference on trust management | 2011

Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling

M. Angela Sasse; Iacovos Kirlappos

The past 10 years have seen a plethora of research on trust in online interactions. In the late 90s, the issue was whether people would be willing to trust the Internet enough to order and enter their credit card details online. Most of the academic research and commercial advice published then focused on ’how to increase user trust online’ by making websites ’user friendly’ and having a ’personal touch’ e.g. in the form of photos of company staff. Unfortunately, much this advice on how to make your Internet presence trustworthy is now being used by perpetrators of phishing scams, who are using the latest ’trustworthy UI design techniques’ to trick users into revealing authentication credentials and other personal data. A key trust issue that has emerged with the huge popularity of social networking is users’ voluntary (and sometimes ill-judged) disclosure of personal information, and accidental sharing of that data by applications and other users.


ieee symposium on security and privacy | 2012

Security Education against Phishing: A Modest Proposal for a Major Rethink

Iacovos Kirlappos; M. Angela Sasse


In: (Proceedings) Workshop on Usable Security. (2014) | 2014

Learning from “Shadow Security”: Why understanding non-compliance provides the basis for effective security

Iacovos Kirlappos; S Parkin; Ma Sasse


ACM Sigcas Computers and Society | 2015

Shadow security as a tool for the learning organization

Iacovos Kirlappos; Simon Parkin; M. Angela Sasse


Workshop on Usable Security | 2014

Learning from “Shadow Security:” Why Understanding Non-Compliant Behaviors Provides the Basis for Effective Security

Iacovos Kirlappos; Simon Parkin; M. Angela Sasse


trust and trustworthy computing | 2012

Why trust seals don't work: a study of user perceptions and behavior

Iacovos Kirlappos; M. Angela Sasse; Nigel Harvey


international conference on human-computer interaction | 2014

What Usable Security Really Means: Trusting and Engaging Users

Iacovos Kirlappos; M. Angela Sasse


Archive | 2012

Security Education against Phishing

Iacovos Kirlappos; M. Angela Sasse

Collaboration


Dive into the Iacovos Kirlappos's collaboration.

Top Co-Authors

Avatar

M. Angela Sasse

University College London

View shared research outputs
Top Co-Authors

Avatar

Simon Parkin

University College London

View shared research outputs
Top Co-Authors

Avatar

Adam Beautement

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michael Huth

Imperial College London

View shared research outputs
Top Co-Authors

Avatar

Nigel Harvey

University College London

View shared research outputs
Researchain Logo
Decentralizing Knowledge