Trustworthy LLMs: A survey and guideline for evaluating large language models' alignment

Y Liu, Y Yao, JF Ton, X Zhang, RGH Cheng… - ar** regions
A Vashistha, R Anderson, S Mare - Proceedings of the 1st ACM SIGCAS …, 2018 - dl.acm.org
Prior research suggests that security and privacy needs of users in develo** regions are
different than those in developed regions. To better understand the underlying differentiating …

Investigating system operators' perspective on security misconfigurations

C Dietrich, K Krombholz, K Borgolte… - Proceedings of the 2018 …, 2018 - dl.acm.org
Nowadays, security incidents have become a familiar" nuisance," and they regularly lead to
the exposure of private and sensitive data. The root causes for such incidents are rarely …

Ethics emerging: the story of privacy and security perceptions in virtual reality

D Adams, A Bah, C Barwulor, N Musaby… - … Symposium on Usable …, 2018 - usenix.org
Virtual reality (VR) technology aims to transport the user to a virtual world, fully immersing
them in an experience entirely separate from the real world. VR devices can use sensor data …

Why can't johnny fix vulnerabilities: A usability evaluation of static analysis tools for security

J Smith, LNQ Do, E Murphy-Hill - Sixteenth Symposium on Usable …, 2020 - usenix.org
Static analysis tools can help prevent security incidents, but to do so, they must enable
developers to resolve the defects they detect. Unfortunately, developers often struggle to …

Why developers cannot embed privacy into software systems? An empirical investigation

A Senarath, NAG Arachchilage - Proceedings of the 22nd International …, 2018 - dl.acm.org
Pervasive use of software applications continue to challenge user privacy when users
interact with software systems. Even though privacy practices such as Privacy by Design …

How does usable security (not) end up in software products? results from a qualitative interview study

M Gutfleisch, JH Klemmer, N Busch… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …