Contestability for content moderation

K Vaccaro, Z **ao, K Hamilton… - Proceedings of the ACM on …, 2021 - dl.acm.org
Content moderation systems for social media have had numerous issues of bias, in terms of
race, gender, and ability among many others. One proposal for addressing such issues in …

" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing

AS Ami, K Moran, D Poshyvanyk… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …

Unhelpful assumptions in software security research

I Ryan, U Roedig, KJ Stol - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
In the study of software security many factors must be considered. Once venturing beyond
the simplest of laboratory experiments, the researcher is obliged to contend with …

Why can't johnny fix vulnerabilities: A usability evaluation of static analysis tools for security

J Smith, LNQ Do, E Murphy-Hill - Sixteenth Symposium on Usable …, 2020 - usenix.org
Static analysis tools can help prevent security incidents, but to do so, they must enable
developers to resolve the defects they detect. Unfortunately, developers often struggle to …

Overcoming algorithm aversion: a comparison between process and outcome control

L Cheng, A Chouldechova - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
Algorithm aversion occurs when humans are reluctant to use algorithms despite their
superior performance. Studies show that giving users outcome control by providing agency …

A First Look into Targeted Clickbait and its Countermeasures: The Power of Storytelling

A Shrestha, A Flood, S Sohrawardi, M Wright… - Proceedings of the …, 2024 - dl.acm.org
Clickbait headlines work through superlatives and intensifiers, creating information gaps to
increase the relevance of their associated links that direct users to time-wasting and …

Where to recruit for security development studies: Comparing six software developer samples

H Kaur, S Klivan, D Votipka, Y Acar, S Fahl - 31st USENIX Security …, 2022 - usenix.org
Studying developers is an important aspect of usable security and privacy research. In
particular, studying security development challenges such as the usability of security APIs …

Exploring design and governance challenges in the development of privacy-preserving computation

N Agrawal, R Binns, M Van Kleek, K Laine… - Proceedings of the …, 2021 - dl.acm.org
Homomorphic encryption, secure multi-party computation, and differential privacy are part of
an emerging class of Privacy Enhancing Technologies which share a common promise: to …

Security notifications in static analysis tools: Developers' attitudes, comprehension, and ability to act on them

M Tahaei, K Vaniea, K Beznosov… - Proceedings of the 2021 …, 2021 - dl.acm.org
Static analysis tools (SATs) have the potential to assist developers in finding and fixing
vulnerabilities in the early stages of software development, requiring them to be able to …