Nalin A. G. Arachchilage

Orcid: 0000-0001-9192-0993

Affiliations:
  • University of Auckland, New Zealand
  • University of New South Wales, Canberra, ACT, Australia (former)


According to our database1, Nalin A. G. Arachchilage authored at least 75 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions.
CoRR, 2024

SoK: Demystifying Privacy Enhancing Technologies Through the Lens of Software Developers.
CoRR, 2024

2023
SoK: Access Control Policy Generation from High-level Natural Language Requirements.
CoRR, 2023

Evaluation of Game Design Framework Using a Gamified Browser-Based Application.
CoRR, 2023

What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility.
CoRR, 2023

SPBAC: A Semantic Policy-based Access Control for Database Query.
Proceedings of the 5th World Symposium on Software Engineering, 2023


2022
PrivacyCube: A Tangible Device for Improving Privacy Awareness in IoT.
CoRR, 2022

Developers' Privacy Education: A game framework to stimulate secure coding behaviour.
Proceedings of the IEEE Smartworld, 2022

Demo Abstract: PrivacyCube: A Tangible Device for Improving Privacy Awareness in IoT.
Proceedings of the Seventh IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2022

2021
Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails.
Secur. Priv., 2021

Understanding users' perceptions to improve fallback authentication.
Pers. Ubiquitous Comput., 2021

The role of self-efficacy on the adoption of information systems security innovations: a meta-analysis assessment.
Pers. Ubiquitous Comput., 2021

I'm all ears! Listening to software developers on putting GDPR principles into software development practice.
Pers. Ubiquitous Comput., 2021

Software developers need help too! Developing a methodology to analyse cognitive dimension-based feedback on usability.
Behav. Inf. Technol., 2021

Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors.
Proceedings of the 42nd International Conference on Information Systems, 2021

Eye-GUAna: Higher Gaze-Based Entropy and Increased Password Space in Graphical User Authentication Through Gamification.
Proceedings of the 2021 Symposium on Eye Tracking Research and Applications, 2021

Better, Funner, Stronger: A Gameful Approach to Nudge People into Making Less Predictable Graphical Password Choices.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

A Serious Game Design Framework for Software Developers to Put GDPR into Practice.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach.
Secur. Priv., 2020

Why are Developers Struggling to Put GDPR into Practice when Developing Privacy-Preserving Software Systems?
CoRR, 2020

Designing a serious game: teaching developers to embed privacy into software systems.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

Vision: Why Johnny Can't Configure Smart Home? A Behavioural Framework for Smart Home Privacy Configuration.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies.
ACM Trans. Priv. Secur., 2019

Using cognitive dimensions to evaluate the usability of security APIs: An empirical investigation.
Inf. Softw. Technol., 2019

That's Not Me! Designing Fictitious Profiles to Answer Security Questions.
CoRR, 2019

On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations.
CoRR, 2019

Why Johnny can't develop a secure application? A usability analysis of Java Secure Socket Extension API.
Comput. Secur., 2019

A data minimization model for embedding privacy into software systems.
Comput. Secur., 2019

Fighting Against XSS Attacks. A Usability Evaluation of OWASP ESAPI Output Encoding.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

A Model for System Developers to Measure the Privacy Risk of Data.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

An Empirical Usability Analysis of the Google Authentication API.
Proceedings of the Evaluation and Assessment on Software Engineering, 2019

Engaging Users with Educational Games: The Case of Phishing.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Building Confidence not to be Phished Through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks?
Proceedings of the Australasian Conference on Information Systems, 2019

2018
Defending against phishing attacks: taxonomy of methods, current issues and future directions.
Telecommun. Syst., 2018

Understanding user privacy expectations: A software developer's perspective.
Telematics Informatics, 2018

Security questions education: exploring gamified features and functionalities.
Inf. Comput. Secur., 2018

A methodology to Evaluate the Usability of Security APIs.
CoRR, 2018

Understanding the influence of Individual's Self-efficacy for Information Systems Security Innovation Adoption: A Systematic Literature Review.
CoRR, 2018

Am I Responsible for End-User's Security? A Programmer's Perspective.
CoRR, 2018

Understanding Software Developers' Approach towards Implementing Data Minimization.
CoRR, 2018

Why Johnny Can't Store Passwords Securely?: A Usability Evaluation of Bouncycastle Password Hashing.
Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering, 2018

Why developers cannot embed privacy into software systems?: An empirical investigation.
Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering, 2018

2017
Designing Privacy for You : A User Centric Approach For Privacy.
CoRR, 2017

Security Strength Indicator in Fallback Authentication: Nudging Users for Better Answers in Secret Questions.
CoRR, 2017

A Conceptual Model for the Organisational Adoption of Information System Security Innovations.
CoRR, 2017

Integrating self-efficacy into a gamified approach to thwart phishing attacks.
CoRR, 2017

Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions.
Ann. des Télécommunications, 2017

A Gamified Approach to Improve Users' Memorability of Fall-back Authentication.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs.
Proceedings of the 28th Annual Workshop of the Psychology of Programming Interest Group, 2017

Changing users' security behaviour towards security questions: A game based learning approach.
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017

A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Designing Privacy for You: A Practical Approach for User-Centric Privacy - Practical Approach for User-Centric Privacy.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Involving Users in the Design of a Serious Game for Security Questions Education.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Understanding Organizational Approach towards End User Privacy.
Proceedings of the Australasian Conference on Information Systems, 2017

A Model for Enhancing Human Behaviour with Security Questions: A Theoretical Perspective.
Proceedings of the Australasian Conference on Information Systems, 2017

A Serious Game Design: Nudging Users' Memorability of Security Questions.
Proceedings of the Australasian Conference on Information Systems, 2017

2016
Designing a Mobile Game for Home Computer Users to Protect Against Phishing Attacks.
CoRR, 2016

Serious Games for Cyber Security Education.
CoRR, 2016

Phishing threat avoidance behaviour: An empirical investigation.
Comput. Hum. Behav., 2016

A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective.
Proceedings of the Australasian Conference on Information Systems, 2016

2015
A Critical Review of Theories and Models of Technology Adoption and Acceptance in Information System Research.
Int. J. Technol. Diffusion, 2015

Designing a mobile game to thwarts malicious IT threats: A phishing threat avoidance perspective.
CoRR, 2015

Developing a Trust Domain Taxonomy for Securely Sharing Information Among Others.
CoRR, 2015

Can a Mobile Game Teach Computer Users to Thwart Phishing Attacks?
CoRR, 2015

User-Centred Security Education: A Game Design to Thwart Phishing Attacks.
CoRR, 2015

On the Impact of Touch ID on iPhone Passcodes.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

2014
Security awareness of computer users: A phishing threat avoidance perspective.
Comput. Hum. Behav., 2014

Assessing the Role of Conceptual Knowledge in an Anti-phishing Educational Game.
Proceedings of the IEEE 14th International Conference on Advanced Learning Technologies, 2014

A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
A game design framework for avoiding phishing attacks.
Comput. Hum. Behav., 2013

A taxonomy for securely sharing information among others in a trust domain.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Security awareness of computer users : a game based learning approach.
PhD thesis, 2012


  Loading...