A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - ar**ads&locale=de" data-clk="hl=sv&sa=T&ct=res&cd=7&d=1959499567649114701&ei=zx61Z92JLuzDieoP1oa5-AI" data-clk-atid="TcpBk3mKMRsJ" target="_blank">The Curious Case of Usable Privacy: Challenges, Solutions, and Prospects
S Fischer-Hübner, F Karegar - 2024 - Springer
This book journeys through the labyrinth of usable privacy, a place where the interplay of
privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions …

Deconstructing cybersecurity: From ontological security to ontological insecurity

J Joque, SMT Haque - Proceedings of the New Security Paradigms …, 2020 - dl.acm.org
This paper examines the philosophical aspects of cybersecurity through the lens of
deconstruction, as proposed by the French philosopher Jacques Derrida. We offer …

[PDF][PDF] User experience in authentication research: A Survey

L Kraus, JN Antons, F Kaiser, S Möller - Proceedings of the PQS, 2016 - isca-archive.org
We present a structured literature survey of User Experience (UX) dimensions and
influencing factors in authentication research. The survey is based on authentication papers …