Trustworthy LLMs: A survey and guideline for evaluating large language models' alignment
Investigating system operators' perspective on security misconfigurations
Nowadays, security incidents have become a familiar" nuisance," and they regularly lead to
the exposure of private and sensitive data. The root causes for such incidents are rarely …
the exposure of private and sensitive data. The root causes for such incidents are rarely …
Ethics emerging: the story of privacy and security perceptions in virtual reality
Virtual reality (VR) technology aims to transport the user to a virtual world, fully immersing
them in an experience entirely separate from the real world. VR devices can use sensor data …
them in an experience entirely separate from the real world. VR devices can use sensor data …
Why can't johnny fix vulnerabilities: A usability evaluation of static analysis tools for security
Static analysis tools can help prevent security incidents, but to do so, they must enable
developers to resolve the defects they detect. Unfortunately, developers often struggle to …
developers to resolve the defects they detect. Unfortunately, developers often struggle to …
Why developers cannot embed privacy into software systems? An empirical investigation
Pervasive use of software applications continue to challenge user privacy when users
interact with software systems. Even though privacy practices such as Privacy by Design …
interact with software systems. Even though privacy practices such as Privacy by Design …
How does usable security (not) end up in software products? results from a qualitative interview study
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …
security features. These features are usually implemented by software professionals during …