A deep dive into user's preferences and behavior around mobile phone sharing

R Paudel, P Dumaru, A Shrestha, H Kocabas… - Proceedings of the …, 2023 - dl.acm.org
Users share their personal devices with different entities in various circumstances. While
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …

The “dark side” and negative consequences of cryptocurrencies usage for unethical purposes as barriers to invest in Middle East and African (MEA) countries

A Sestino, D Tuček, S Bresciani - Journal of Small Business and …, 2024 - emerald.com
Purpose This paper aims to unveil the darker side of cryptocurrencies by delving into its role
as an obstacle to investments in Middle East and African (MEAs) countries, unravelling the …

SoK: Social Cybersecurity

Y Wu, WK Edwards, S Das - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
We analyze prior work in social cybersecurity and present a structuring of this literature
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …

The security & privacy acceptance framework (spaf)

S Das, C Faklaris, JI Hong… - Foundations and Trends …, 2022 - nowpublishers.com
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …

" I Have to Use My Son's QR Code to Run the Business": Unpacking Senior Street Vendors' Challenges in Mobile Money Collection in China

C He, L He, Z Lu, B Li - Proceedings of the ACM on Human-Computer …, 2023 - dl.acm.org
Mobile payment systems have become an infrastructural component in citizens' socio-
economic life in China. The rapid shift to a cashless society demands vendors of all ages to …

Integrating handcrafted features with deep representations for smartphone authentication

Y Song, Z Cai - Proceedings of the ACM on Interactive, Mobile …, 2022 - dl.acm.org
Recent research demonstrates the potential of touch dynamics as a usable and privacy-
preserving scheme for smartphone authentication. Most existing approaches rely on …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arxiv preprint arxiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

Protecting the vulnerable: Dimensions of assisted digital access

L Coles-Kemp, N Robinson, CPR Heath - Proceedings of the ACM on …, 2022 - dl.acm.org
A successful digital society is, in part, predicated on people having secure access to digitally-
delivered services when they need it. It has long been recognised that parts of society are …

Understanding Users' Interaction with Login Notifications

P Markert, L Lassak, M Golla, M Dürmuth - Proceedings of the 2024 CHI …, 2024 - dl.acm.org
Login notifications intend to inform users about sign-ins and help them protect their accounts
from unauthorized access. Notifications are usually sent if a login deviates from previous …

“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods

A Erinola, A Buckmann, J Friedauer… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
According to the World Health organization, about 16% of the world's population live with a
disability. While they could benefit from digital products and services, users with disabilities …