Analyzing user perspectives on mobile app privacy at scale

P Nema, P Anthonysamy, N Taft… - Proceedings of the 44th …, 2022 - dl.acm.org
In this paper we present a methodology to analyze users' concerns and perspectives about
privacy at scale. We leverage NLP techniques to process millions of mobile app reviews and …

Tales of software updates: The process of updating software

K Vaniea, Y Rashidi - Proceedings of the 2016 chi conference on human …, 2016 - dl.acm.org
Updates alter the way software functions by fixing bugs, changing features, and modifying
the user interface. Sometimes changes are welcome, even anticipated, and sometimes they …

Do or do not, there is no try: user engagement may not improve security outcomes

A Forget, S Pearman, J Thomas, A Acquisti… - Twelfth Symposium on …, 2016 - usenix.org
Computer security problems often occur when there are disconnects between users'
understanding of their role in computer security and what is expected of them. To help users …

Why i can't authenticate—Understanding the low adoption of authentication ceremonies with autoethnography

M Fassl, K Krombholz - Proceedings of the 2023 CHI Conference on …, 2023 - dl.acm.org
Authentication ceremonies detect and mitigate Man-in-the-Middle (MitM) attacks on end-to-
end encrypted messengers, such as Signal, WhatsApp, or Threema. However, prior work …