Where to recruit for security development studies: Comparing six software developer samples

H Kaur, S Klivan, D Votipka, Y Acar, S Fahl - 31st USENIX Security …, 2022 - usenix.org
Studying developers is an important aspect of usable security and privacy research. In
particular, studying security development challenges such as the usability of security APIs …

Localized text-free user interfaces

QM Ilyas, M Ahmad, N Zaman, MA Alshamari… - IEEE …, 2021 - ieeexplore.ieee.org
User interface is an essential element of an information system from the user perspective.
The use of text in the user interface presents a challenge to some users, such as illiterate …

Not as easy as just update: Survey of System Administrators and Patching Behaviours

ADG Jenkins, L Liu, MK Wolters, K Vaniea - Proceedings of the CHI …, 2024 - dl.acm.org
Patching software theoretically leads to improvements including security critical changes,
but it can also lead to new issues. For System Administrators (sysadmins) new issues can …

" As soon as it's a risk, I want to require {MFA"}: How Administrators Configure Risk-based Authentication

P Markert, T Schnitzler, M Golla… - Eighteenth Symposium on …, 2022 - usenix.org
Risk-based authentication (RBA) complements standard password-based logins by using
knowledge about previously observed user behavior to prevent malicious login attempts …

[PDF][PDF] To Patch, or not To Patch? That is the Question: A Case Study of System Administrators' Online Collaborative Behaviour

A Jenkins, M Wolters, K Vaniea - arxiv preprint arxiv …, 2023 - groups.inf.ed.ac.uk
Authors' addresses: Adam Jenkins, adam. jenkins@ ed. ac. uk, University of Edinburgh,
Edinburgh, United Kingdom; Maria Wolters, maria. wolters@ ed. ac. uk, University of …

Investigating the Password Policy Practices of Website Administrators

S Sahin, S Al Roomi, T Poteat… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Passwords are the de facto standard for online authentication today, and will likely remain
so for the foreseeable future. As a consequence, the security community has extensively …

Learning by Doing: An Online, Open-Source Course Design Approach to Systems Librarianship

CS Burns, J Pusateri… - Journal of Education for …, 2024 - utppublishing.com
This paper presents a novel approach to designing an online, open-source course in
systems librarianship, an area of librarianship that may be perceived as complex and …

Controlling an application via a hybrid interface

M Derzho, A Shafarenko, M Lilley - International Conference on Human …, 2022 - Springer
It is well known to the UX community that Graphical User Interface (GUI) works much better
for data exchange applications than it does for control ones. We propose a new type of …

How the Future Works at SOUPS: Analyzing Future Work Statements and Their Impact on Usable Security and Privacy Research

J Suray, JH Klemmer, J Schmüser, S Fahl - arxiv preprint arxiv …, 2024 - arxiv.org
Extending knowledge by identifying and investigating valuable research questions and
problems is a core function of research. Research publications often suggest avenues for …

(I Can't Get No) Satisfaction: On the Existence of Satisfaction as a Component of Usable Security and Privacy

A Kanaoka - International Conference on Human-Computer …, 2023 - Springer
In the ISO definitions of usability, user satisfaction is specified as an element and
effectiveness and efficiency. Jakob Nielsen, who is well known for his work on usability in …