Where to recruit for security development studies: Comparing six software developer samples
Studying developers is an important aspect of usable security and privacy research. In
particular, studying security development challenges such as the usability of security APIs …
particular, studying security development challenges such as the usability of security APIs …
Localized text-free user interfaces
User interface is an essential element of an information system from the user perspective.
The use of text in the user interface presents a challenge to some users, such as illiterate …
The use of text in the user interface presents a challenge to some users, such as illiterate …
Not as easy as just update: Survey of System Administrators and Patching Behaviours
Patching software theoretically leads to improvements including security critical changes,
but it can also lead to new issues. For System Administrators (sysadmins) new issues can …
but it can also lead to new issues. For System Administrators (sysadmins) new issues can …
" As soon as it's a risk, I want to require {MFA"}: How Administrators Configure Risk-based Authentication
Risk-based authentication (RBA) complements standard password-based logins by using
knowledge about previously observed user behavior to prevent malicious login attempts …
knowledge about previously observed user behavior to prevent malicious login attempts …
[PDF][PDF] To Patch, or not To Patch? That is the Question: A Case Study of System Administrators' Online Collaborative Behaviour
Authors' addresses: Adam Jenkins, adam. jenkins@ ed. ac. uk, University of Edinburgh,
Edinburgh, United Kingdom; Maria Wolters, maria. wolters@ ed. ac. uk, University of …
Edinburgh, United Kingdom; Maria Wolters, maria. wolters@ ed. ac. uk, University of …
Investigating the Password Policy Practices of Website Administrators
Passwords are the de facto standard for online authentication today, and will likely remain
so for the foreseeable future. As a consequence, the security community has extensively …
so for the foreseeable future. As a consequence, the security community has extensively …
Learning by Doing: An Online, Open-Source Course Design Approach to Systems Librarianship
CS Burns, J Pusateri… - Journal of Education for …, 2024 - utppublishing.com
This paper presents a novel approach to designing an online, open-source course in
systems librarianship, an area of librarianship that may be perceived as complex and …
systems librarianship, an area of librarianship that may be perceived as complex and …
Controlling an application via a hybrid interface
M Derzho, A Shafarenko, M Lilley - International Conference on Human …, 2022 - Springer
It is well known to the UX community that Graphical User Interface (GUI) works much better
for data exchange applications than it does for control ones. We propose a new type of …
for data exchange applications than it does for control ones. We propose a new type of …
How the Future Works at SOUPS: Analyzing Future Work Statements and Their Impact on Usable Security and Privacy Research
Extending knowledge by identifying and investigating valuable research questions and
problems is a core function of research. Research publications often suggest avenues for …
problems is a core function of research. Research publications often suggest avenues for …
(I Can't Get No) Satisfaction: On the Existence of Satisfaction as a Component of Usable Security and Privacy
A Kanaoka - International Conference on Human-Computer …, 2023 - Springer
In the ISO definitions of usability, user satisfaction is specified as an element and
effectiveness and efficiency. Jakob Nielsen, who is well known for his work on usability in …
effectiveness and efficiency. Jakob Nielsen, who is well known for his work on usability in …