A design space for effective privacy notices

F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …

How to make privacy policies both GDPR-compliant and usable

K Renaud, LA Shepherd - 2018 International Conference On …, 2018 - ieeexplore.ieee.org
It is important for organisations to ensure that their privacy policies are General Data
Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline …

Adapting security warnings to counter online disinformation

B Kaiser, J Wei, E Lucherini, K Lee, JN Matias… - 30th USENIX Security …, 2021 - usenix.org
Disinformation is proliferating on the internet, and platforms are responding by attaching
warnings to content. There is little evidence, however, that these warnings help users …

Using personal examples to improve risk communication for security & privacy decisions

M Harbach, M Hettig, S Weber, M Smith - Proceedings of the SIGCHI …, 2014 - dl.acm.org
IT security systems often attempt to support users in taking a decision by communicating
associated risks. However, a lack of efficacy as well as problems with habituation in such …

" If HTTPS Were Secure, I Wouldn't Need 2FA"-End User and Administrator Mental Models of HTTPS

K Krombholz, K Busse, K Pfeffer… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
HTTPS is one of the most important protocols used to secure communication and is,
fortunately, becoming more pervasive. However, especially the long tail of websites is still …

Habituation effects in computer security warning

A Amran, ZF Zaaba… - … security journal: A global …, 2018 - Taylor & Francis
Security warning is a form of computer dialog communication that is used to inform the users
on the risks of allowing random applications to run on a computer system. Accordingly, it is …

" I Have No Idea What I'm Doing"-On the Usability of Deploying {HTTPS}

K Krombholz, W Mayer, M Schmiedecker… - 26th USENIX Security …, 2017 - usenix.org
Protecting communication content at scale is a difficult task, and TLS is the protocol most
commonly used to do so. However, it has been shown that deploying it in a truly secure …

" It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users' Misconceptions About {FIDO2} Biometric {WebAuthn}

L Lassak, A Hildebrandt, M Golla, B Ur - 30th USENIX Security …, 2021 - usenix.org
While prior attempts at passwordless authentication on the web have required specialized
hardware, FIDO2's WebAuthn protocol lets users sign into websites with their smartphone …

[PDF][PDF] “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication

JH Klemmer, M Gutfleisch, C Stransky, Y Acar… - 2023 - saschafahl.de
Password-based authentication is the status quo on the web and beyond [6, 13, 14]—
despite its many known problems. This includes challenges around memorizing passwords …

Explanations in warning dialogs to help users defend against phishing attacks

G Desolda, J Aneke, C Ardito, R Lanzilotti… - International Journal of …, 2023 - Elsevier
Phishing, the deceptive act of stealing personal and sensitive information by sending
messages that seem to come from trusted entities, is one of the most widespread and …