Human factors in security research: Lessons learned from 2008-2018
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …
into account the human factor by studying regular users and, to a lesser extent, experts like …
Security-visible, yet unseen?
An unsolved debate in the field of usable security concerns whether security mechanisms
should be visible, or blackboxed away from the user for the sake of usability. However, tying …
should be visible, or blackboxed away from the user for the sake of usability. However, tying …
Two Sides of the Shield: Understanding Protective {DNS} adoption factors
Protective DNS (PDNS) filters out DNS requests leading to harmful resources. PDNS is
currently being promoted by various governments and industry players–some global public …
currently being promoted by various governments and industry players–some global public …
Exploring user-centered security design for usable authentication ceremonies
Security technology often follows a systems design approach that focuses on components
instead of users. As a result, the users' needs and values are not sufficiently addressed …
instead of users. As a result, the users' needs and values are not sufficiently addressed …
From utility to capability: a new paradigm to conceptualize and develop inclusive pets
P Das Chowdhury, A Domínguez Hernández… - Proceedings of the …, 2022 - dl.acm.org
The wider adoption of Privacy Enhancing Technologies (PETs) has relied on usability
studies–which focus mainly on an assessment of how a specified group of users interface, in …
studies–which focus mainly on an assessment of how a specified group of users interface, in …
I Blame Apple in Part for My False Expectations: An Autoethnographic Study of Apple's Lockdown Mode in iOS
B Mader, C Eichenmüller, G Pugliese… - arxiv preprint arxiv …, 2024 - arxiv.org
Lockdown Mode was introduced in 2022 as a hardening setting for Apple's operating
systems, designed to strengthen the protection against``some of the most sophisticated …
systems, designed to strengthen the protection against``some of the most sophisticated …
Designing and evaluating a resident-centric digital wallet experience
S Chuhan, V Wojnas - International Conference on Human-Computer …, 2023 - Springer
This paper focuses on the results of usability testing of a self-sovereign digital identity (SSI)
wallet prototype designed by the Ontario Digital Service User Experience team. The …
wallet prototype designed by the Ontario Digital Service User Experience team. The …
From secure to military-grade: Exploring the effect of app descriptions on user perceptions of secure messaging
Although end-to-end encryption (E2EE) is more widely available than ever before, many
users remain confused about its security properties. As a result, even users with access to …
users remain confused about its security properties. As a result, even users with access to …
Understanding user perceptions of security and privacy for group chat: a survey of users in the US and UK
Secure messaging tools are an integral part of modern society. While there is a significant
body of secure messaging research generally, there is a lack of information regarding users' …
body of secure messaging research generally, there is a lack of information regarding users' …
Security–visible, yet unseen? how displaying security mechanisms impacts user experience and perceived security
An unsolved debate in the field of usable security concerns whether security mechanisms
should be visible, or blackboxed away from the user for the sake of usability. However, tying …
should be visible, or blackboxed away from the user for the sake of usability. However, tying …