A Risk Homeostasis Perspective on Zimbabwean Protective Point-of-Sale Transaction BehavioursWorkshop
Zimbabwe has introduced a number of currency reforms since the beginning of 2019. Of note are the Statutory Instruments 142 (SI142) and SI16 enacted in March 2019, which replaced the multi-currency regime with the Zimbabwe dollar as legal tender, rendering all other currencies illegal. These events constitute a unique opportunity to carry out a “natural experiment”. We used the opportunity to explore the impact of the currency changes on Zimbabweans’ protective PIN shielding behaviours. Our study was carried out spanning both the multi-currency and Zimbabwe Dollar (ZWL) currency periods. We observed far less PIN shielding than in comparable studies in other countries, and we suggest that this is due to uncertainty and reduced currency values. In essence, this was a natural experiment into the impact of currency changes on citizen behaviours, and what we discovered revealed an unexpected real-life risk homeostasis response.
Mon 21 SepDisplayed time zone: (UTC) Coordinated Universal Time change
02:50 - 03:50 | |||
02:50 12mTalk | A Risk Homeostasis Perspective on Zimbabwean Protective Point-of-Sale Transaction BehavioursWorkshop [Workshop] HCSE&CS | ||
03:02 12mTalk | Designing a Serious Game: Teaching Developers to Embed Privacy into Software SystemsWorkshop [Workshop] HCSE&CS Nalin Asanka Gamagedara Arachchilage La Trobe University, Australia, Mumtaz Abdulhameed Technovation Consulting & Training PVT | ||
03:14 12mTalk | Vulnerability Discovery Strategies Used in Software ProjectsWorkshop [Workshop] HCSE&CS Farzana Ahamed Bhuiyan Tennessee Tech University, Akond Rahman Tennessee Tech University, Patrick Morrison IBM | ||
03:26 12mTalk | An Informed Consent Model for Handling the Privacy Paradox in Smart BuildingsWorkshop [Workshop] HCSE&CS Chehara Pathmabandu Monash University, Mohan Baruwal Chhetri Data61 CSIRO Australia, John Grundy Monash University, A: Zubair Baig Deakin University | ||
03:38 12mTalk | Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code ScriptsWorkshop [Workshop] HCSE&CS |