You are not your developer, either: A research agenda for usable security and privacy research beyond end users

Y Acar, S Fahl, ML Mazurek - 2016 IEEE Cybersecurity …, 2016 - ieeexplore.ieee.org
While researchers have developed many tools, techniques, and protocols for improving
software security, exploits and breaches are only becoming more frequent. Some of this gap …

A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

{“My} data just goes {Everywhere:”} user mental models of the internet and implications for privacy and security

R Kang, L Dabbish, N Fruchter, S Kiesler - Eleventh symposium on …, 2015 - usenix.org
Many people use the Internet every day yet know little about how it really works. Prior
literature diverges on how people's Internet knowledge affects their privacy and security …

{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices

I Ion, R Reeder, S Consolvo - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
The state of advice given to people today on how to stay safe online has plenty of room for
improvement. Too many things are asked of them, which may be unrealistic, time …

Adaptive folk theorization as a path to algorithmic literacy on changing platforms

MA DeVito - Proceedings of the ACM on Human-Computer …, 2021 - dl.acm.org
The increased importance of opaque, algorithmically-driven social platforms (eg, Facebook,
YouTube) to everyday users as a medium for self-presentation effectively requires users to …

Why do they do what they do?: A study of what motivates users to (not) follow computer security advice

M Fagan, MMH Khan - Twelfth symposium on usable privacy and …, 2016 - usenix.org
Usable security researchers have long been interested in what users do to keep their
devices and data safe and how that compares to recommendations. Additionally, experts …

How do Older Adults feel about engaging with Cyber‐Security?

B Morrison, L Coventry, P Briggs - Human behavior and …, 2021 - Wiley Online Library
Older adults are increasingly a target for cyber‐attacks; however, very little research has
investigated how they feel about engaging in protective cyber‐security behaviors. We …

Too much knowledge? security beliefs and protective behaviors among united states internet users

R Wash, E Rader - Eleventh Symposium On Usable Privacy and Security …, 2015 - usenix.org
Home computers are frequently the target of malicious attackers because they are usually
administered by non-experts. Prior work has found that users who make security decisions …

Examining the adoption and abandonment of security, privacy, and identity theft protection practices

Y Zou, K Roundy, A Tamersoy, S Shintre… - Proceedings of the …, 2020 - dl.acm.org
Users struggle to adhere to expert-recommended security and privacy practices. While prior
work has studied initial adoption of such practices, little is known about the subsequent …

Tales of software updates: The process of updating software

K Vaniea, Y Rashidi - Proceedings of the 2016 chi conference on human …, 2016 - dl.acm.org
Updates alter the way software functions by fixing bugs, changing features, and modifying
the user interface. Sometimes changes are welcome, even anticipated, and sometimes they …