[HTML][HTML] Multi-level fuzzy system for usable-security assessment

A Agrawal, M Alenezi, SA Khan, R Kumar… - Journal of King Saud …, 2022 - Elsevier
Indubitably, security is an integral aspect of the development of quality software. More
importantly, usability is also an elemental and pivotal factor for develo** quality software …

A comprehensive overview of government hacking worldwide

CY Li, CC Huang, F Lai, SL Lee, J Wu - IEEE Access, 2018 - ieeexplore.ieee.org
There has been an ongoing and heated public policy debate on the appropriate role of and
limitations to government hacking in maintaining a proper balance of national security and …

" I {don't} know why I check this...''-Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks

P Mayer, D Poddebniak, K Fischer… - … Symposium on Usable …, 2022 - usenix.org
OpenPGP is one of the two major standards for end-to-end email security. Several studies
showed that serious usability issues exist with tools implementing this standard. However, a …

Getting rid of the usability/security trade-off: a behavioral approach

F Di Nocera, G Tempestini - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
The usability/security trade-off indicates the inversely proportional relationship that seems to
exist between usability and security. The more secure the systems, the less usable they will …

Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios

S Linsner, K Demuth, M Fischlin… - Proceedings on Privacy …, 2024 - petsymposium.org
In many scenarios, users have to communicate sensitive data with third parties such as
doctors, lawyers, insurance companies, social workers, or online shops. Handing over …