A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

Judgment and decision making

B Fischhoff, SB Broomell - Annual review of psychology, 2020 - annualreviews.org
The science of judgment and decision making involves three interrelated forms of research:
analysis of the decisions people face, description of their natural responses, and …

Predicting impending exposure to malicious content from user behavior

M Sharif, J Urakawa, N Christin, A Kubota… - Proceedings of the 2018 …, 2018 - dl.acm.org
Many computer-security defenses are reactive---they operate only when security incidents
take place, or immediately thereafter. Recent efforts have attempted to predict security …

Better together: The interplay between a phishing awareness video and a link-centric phishing support tool

BM Berens, F Schaub, M Mossano… - Proceedings of the 2024 …, 2024 - dl.acm.org
Two popular approaches for hel** consumers avoid phishing threats are phishing
awareness videos and tools supporting users in identifying phishing emails. Awareness …

It's the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling

S Kleitman, MKH Law, J Kay - PloS one, 2018 - journals.plos.org
Phishing email is one of the biggest risks to online information security due to its ability to
exploit human trust and naivety. Prior research has examined whether some people are …

Phishing with malicious QR codes

F Sharevski, A Devine, E Pieroni, P Jachim - Proceedings of the 2022 …, 2022 - dl.acm.org
The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world.
That changed overnight, as the QR codes became a convenient go-between for sharing …

Away from prying eyes: Analyzing usage and understanding of private browsing

H Habib, J Colnago, V Gopalakrishnan… - … symposium on usable …, 2018 - usenix.org
Previous research has suggested that people use the private browsing mode of their web
browsers to conduct privacy-sensitive activities online, but have misconceptions about how it …

[PDF][PDF] How WEIRD is usable privacy and security research?

AA Hasegawa, D Inoue, M Akiyama - 33rd USENIX Security Symposium, 2024 - usenix.org
In human factor fields such as human-computer interaction (HCI) and psychology,
researchers have been concerned that participants mostly come from WEIRD (Western …

" Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media

S Bhagavatula, L Bauer, A Kapadia - … of the ACM on Human-Computer …, 2022 - dl.acm.org
In order to keep one's computing systems and data secure, it is critical to be aware of how to
effectively maintain security and privacy online. Prior experimental work has shown that …