Human factors in security research: Lessons learned from 2008-2018

M Kaur, M van Eeten, M Janssen, K Borgolte… - arxiv preprint arxiv …, 2021 - arxiv.org
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …

Security-visible, yet unseen?

V Distler, ML Zollinger, C Lallemand… - Proceedings of the …, 2019 - dl.acm.org
An unsolved debate in the field of usable security concerns whether security mechanisms
should be visible, or blackboxed away from the user for the sake of usability. However, tying …

Two Sides of the Shield: Understanding Protective {DNS} adoption factors

E Rodríguez, R Anghel, S Parkin, M Van Eeten… - 32nd USENIX Security …, 2023 - usenix.org
Protective DNS (PDNS) filters out DNS requests leading to harmful resources. PDNS is
currently being promoted by various governments and industry players–some global public …

Exploring user-centered security design for usable authentication ceremonies

M Fassl, LT Gröber, K Krombholz - … of the 2021 CHI Conference on …, 2021 - dl.acm.org
Security technology often follows a systems design approach that focuses on components
instead of users. As a result, the users' needs and values are not sufficiently addressed …

From utility to capability: a new paradigm to conceptualize and develop inclusive pets

P Das Chowdhury, A Domínguez Hernández… - Proceedings of the …, 2022 - dl.acm.org
The wider adoption of Privacy Enhancing Technologies (PETs) has relied on usability
studies–which focus mainly on an assessment of how a specified group of users interface, in …

I Blame Apple in Part for My False Expectations: An Autoethnographic Study of Apple's Lockdown Mode in iOS

B Mader, C Eichenmüller, G Pugliese… - arxiv preprint arxiv …, 2024 - arxiv.org
Lockdown Mode was introduced in 2022 as a hardening setting for Apple's operating
systems, designed to strengthen the protection against``some of the most sophisticated …

Designing and evaluating a resident-centric digital wallet experience

S Chuhan, V Wojnas - International Conference on Human-Computer …, 2023 - Springer
This paper focuses on the results of usability testing of a self-sovereign digital identity (SSI)
wallet prototype designed by the Ontario Digital Service User Experience team. The …

From secure to military-grade: Exploring the effect of app descriptions on user perceptions of secure messaging

O Akgul, R Abu-Salma, W Bai, EM Redmiles… - Proceedings of the 20th …, 2021 - dl.acm.org
Although end-to-end encryption (E2EE) is more widely available than ever before, many
users remain confused about its security properties. As a result, even users with access to …

Understanding user perceptions of security and privacy for group chat: a survey of users in the US and UK

S Oesch, R Abu-Salma, O Diallo, J Krämer… - Proceedings of the 36th …, 2020 - dl.acm.org
Secure messaging tools are an integral part of modern society. While there is a significant
body of secure messaging research generally, there is a lack of information regarding users' …

Security–visible, yet unseen? how displaying security mechanisms impacts user experience and perceived security

V Distler, ML Zollinger, C Lallemand… - Proceedings of ACM …, 2019 - orbilu.uni.lu
An unsolved debate in the field of usable security concerns whether security mechanisms
should be visible, or blackboxed away from the user for the sake of usability. However, tying …