An unexpectedly large count of trees in the West African Sahara and Sahel

M Brandt, CJ Tucker, A Kariryaa, K Rasmussen, C Abel… - Nature, 2020 - nature.com
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …

[HTML][HTML] Password-based authentication and the experiences of end users

A Ezugwu, E Ukwandu, C Ugwu, M Ezema, C Olebara… - Scientific African, 2023 - Elsevier
Passwords are used majorly for end-user authentication in information and communication
technology (ICT) systems due to its perceived ease of use. The use for end-user …

From personal data to digital legacy: Exploring conflicts in the sharing, security and privacy of post-mortem data

J Holt, J Nicholson, JD Smeddinck - Proceedings of the Web Conference …, 2021 - dl.acm.org
As digital technologies become more prevalent there is a growing awareness of the
importance of good security and privacy practices. The tools and techniques used to achieve …

" Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media

S Bhagavatula, L Bauer, A Kapadia - … of the ACM on Human-Computer …, 2022 - dl.acm.org
In order to keep one's computing systems and data secure, it is critical to be aware of how to
effectively maintain security and privacy online. Prior experimental work has shown that …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arxiv preprint arxiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

Normal and easy: Account sharing practices in the workplace

Y Song, C Faklaris, Z Cai, JI Hong… - Proceedings of the ACM …, 2019 - dl.acm.org
Work is being digitized across all sectors, and digital account sharing has become common
in the workplace. In this paper, we conduct a qualitative and quantitative study of digital …

Predicting software vulnerability using security discussion in social media

A Queiroz, B Keegan, F Mtenzi - 2017 - arrow.tudublin.ie
Social media has been used as a tool for the dissemination and exchange of information
among people in many different areas of knowledge. Computer security is one which utilises …

Disruptions, dilemmas and paradoxes: Ethical matter (s) in design research

LP Nathan, A Thieme, D Tatar… - Interacting with …, 2016 - academic.oup.com
This special issue on ethical matter (s) contains innovative and reflective scholarship
focused on questions of ethics with human computer interaction (HCI) design research …

" Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion

L Simko, A Hutchinson, A Isaac, E Fries… - Proceedings of the …, 2024 - dl.acm.org
COVID-19 caused an abrupt shift towards remote learning, and along with it, an increased
adoption of remote, online proctoring technology to both dissuade and identify academic …

What breach? Measuring online awareness of security incidents by studying real-world browsing behavior

S Bhagavatula, L Bauer, A Kapadia - Proceedings of the 2021 European …, 2021 - dl.acm.org
Learning about real-world security incidents and data breaches can inform people how their
information is vulnerable online and thus encourage safer security behavior. This paper …