Nudges for privacy and security: Understanding and assisting users' choices online

A Acquisti, I Adjerid, R Balebako… - ACM Computing …, 2017 - dl.acm.org
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …

Current advances, trends and challenges of machine learning and knowledge extraction: from machine learning to explainable AI

A Holzinger, P Kieseberg, E Weippl… - International cross-domain …, 2018 - Springer
In this short editorial we present some thoughts on present and future trends in Artificial
Intelligence (AI) generally, and Machine Learning (ML) specifically. Due to the huge ongoing …

You get where you're looking for: The impact of information sources on code security

Y Acar, M Backes, S Fahl, D Kim… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Vulnerabilities in Android code--including but not limited to insecure data storage,
unprotected inter-component communication, broken TLS implementations, and violations of …

Developers are not the enemy!: The need for usable security apis

M Green, M Smith - IEEE Security & Privacy, 2016 - ieeexplore.ieee.org
Rather than recognizing software engineers' limitations, modern security practice has
created an adversarial relationship between security software designers and the developers …

'Think secure from the beginning' A Survey with Software Developers

H Assal, S Chiasson - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
Vulnerabilities persist despite existing software security initiatives and best practices. This
paper focuses on the human factors of software security, including human behaviour and …

“It's not actually that horrible” Exploring Adoption of Two-Factor Authentication at a University

J Colnago, S Devlin, M Oates, C Swoopes… - Proceedings of the …, 2018 - dl.acm.org
Despite the additional protection it affords, two-factor authentication (2FA) adoption
reportedly remains low. To better understand 2FA adoption and its barriers, we observed the …

Understanding shoulder surfing in the wild: Stories from users and observers

M Eiband, M Khamis, E Von Zezschwitz… - Proceedings of the …, 2017 - dl.acm.org
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …

Do users' perceptions of password security match reality?

B Ur, J Bees, SM Segreti, L Bauer, N Christin… - Proceedings of the …, 2016 - dl.acm.org
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …

A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

Kee** a low profile? Technology, risk and privacy among undocumented immigrants

T Guberek, A McDonald, S Simioni, AH Mhaidli… - Proceedings of the …, 2018 - dl.acm.org
Undocumented immigrants in the United States face risks of discrimination, surveillance,
and deportation. We investigate their technology use, risk perceptions, and protective …