A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
[HTML][HTML] A survey exploring open source Intelligence for smarter password cracking
From the end of the last century to date, consumers are increasingly living their lives online.
In today's world, the average person spends a significant proportion of their time connecting …
In today's world, the average person spends a significant proportion of their time connecting …
Fast, lean, and accurate: Modeling password guessability using neural networks
Human-chosen text passwords, today's dominant form of authentication, are vulnerable to
guessing attacks. Unfortunately, existing approaches for evaluating password strength by …
guessing attacks. Unfortunately, existing approaches for evaluating password strength by …
Designing password policies for strength and usability
Password-composition policies are the result of service providers becoming increasingly
concerned about the security of online accounts. These policies restrict the space of user …
concerned about the security of online accounts. These policies restrict the space of user …
Password policies of most top websites fail to follow best practices
We examined the policies of 120 of the most popular websites for when a user creates a
new password for their account. Despite well-established advice that has emerged from the …
new password for their account. Despite well-established advice that has emerged from the …
Practical recommendations for stronger, more usable passwords combining minimum-strength, minimum-length, and blocklist requirements
Multiple mechanisms exist to encourage users to create stronger passwords, including
minimum-length and character-class requirements, prohibiting blocklisted passwords, and …
minimum-length and character-class requirements, prohibiting blocklisted passwords, and …
Why older adults (Don't) use password managers
Password managers (PMs) are considered highly effective tools for increasing security, and
a recent study by Pearman et al.(SOUPS'19) highlighted the motivations and barriers to …
a recent study by Pearman et al.(SOUPS'19) highlighted the motivations and barriers to …
Gamification techniques for raising cyber security awareness
S Scholefield, LA Shepherd - HCI for Cybersecurity, Privacy and Trust: First …, 2019 - Springer
Due to the prevalence of online services in modern society, such as internet banking and
social media, it is important for users to have an understanding of basic security measures in …
social media, it is important for users to have an understanding of basic security measures in …
This pin can be easily guessed: Analyzing the security of smartphone unlock pins
We provide the first comprehensive study of user-chosen 4-and 6-digit PINs (n= 1220)
collected on smartphones with participants being explicitly primed for device unlocking. We …
collected on smartphones with participants being explicitly primed for device unlocking. We …
The security & privacy acceptance framework (spaf)
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …