A design space for effective privacy notices
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
How to make privacy policies both GDPR-compliant and usable
It is important for organisations to ensure that their privacy policies are General Data
Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline …
Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline …
Adapting security warnings to counter online disinformation
Disinformation is proliferating on the internet, and platforms are responding by attaching
warnings to content. There is little evidence, however, that these warnings help users …
warnings to content. There is little evidence, however, that these warnings help users …
Using personal examples to improve risk communication for security & privacy decisions
IT security systems often attempt to support users in taking a decision by communicating
associated risks. However, a lack of efficacy as well as problems with habituation in such …
associated risks. However, a lack of efficacy as well as problems with habituation in such …
" If HTTPS Were Secure, I Wouldn't Need 2FA"-End User and Administrator Mental Models of HTTPS
HTTPS is one of the most important protocols used to secure communication and is,
fortunately, becoming more pervasive. However, especially the long tail of websites is still …
fortunately, becoming more pervasive. However, especially the long tail of websites is still …
Habituation effects in computer security warning
Security warning is a form of computer dialog communication that is used to inform the users
on the risks of allowing random applications to run on a computer system. Accordingly, it is …
on the risks of allowing random applications to run on a computer system. Accordingly, it is …
" I Have No Idea What I'm Doing"-On the Usability of Deploying {HTTPS}
Protecting communication content at scale is a difficult task, and TLS is the protocol most
commonly used to do so. However, it has been shown that deploying it in a truly secure …
commonly used to do so. However, it has been shown that deploying it in a truly secure …
" It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users' Misconceptions About {FIDO2} Biometric {WebAuthn}
While prior attempts at passwordless authentication on the web have required specialized
hardware, FIDO2's WebAuthn protocol lets users sign into websites with their smartphone …
hardware, FIDO2's WebAuthn protocol lets users sign into websites with their smartphone …
[PDF][PDF] “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication
Password-based authentication is the status quo on the web and beyond [6, 13, 14]—
despite its many known problems. This includes challenges around memorizing passwords …
despite its many known problems. This includes challenges around memorizing passwords …
Explanations in warning dialogs to help users defend against phishing attacks
Phishing, the deceptive act of stealing personal and sensitive information by sending
messages that seem to come from trusted entities, is one of the most widespread and …
messages that seem to come from trusted entities, is one of the most widespread and …