Skip to main content
Article
Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account
Lecture Notes in Computer Science
  • Huzeyfe Kocabas, Utah State University
  • Swapnil Nandy, Jadavpur University
  • Tanjina Tamanna, University of Dhaka
  • Mahdi Nasrullah Al-Ameen, Utah State University
Document Type
Conference Paper
Publisher
Springer
Publication Date
7-3-2021
Disciplines
Abstract

A wide-range of personal and sensitive information are stored in users’ online accounts. Losing access, or an unauthorized access to one of those accounts could put them into the risks of privacy breach, cause financial loss, and compromise their accessibility to important information and documents. A large body of prior work focused on developing new schemes and strategies to protect users’ online security. However, there is a dearth in existing literature to understand users’ strategies and contingency plans to protect their online accounts once they lose access, or identify an unauthorized access to one of their accounts. We addressed this gap in our work, where we conducted semi-structured interview with 59 participants from three different countries: Bangladesh, Turkey, and USA. Our findings reveal the unawareness, misconceptions, and privacy and accessibility concerns of users, which refrain them from taking security-preserving steps to protect their online accounts. We also identified users’ prevention strategies that could put their online security into further risks.

Comments

This is a post-peer-review, pre-copyedit version of an article published in Lecture Notes in Computer Science. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-030-77392-2_20

Citation Information
Kocabas H., Nandy S., Tamanna T., Al-Ameen M.N. (2021) Understanding User’s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account. In: Moallem A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2021. Lecture Notes in Computer Science, vol 12788. Springer, Cham. https://doi.org/10.1007/978-3-030-77392-2_20