You are not your developer, either: A research agenda for usable security and privacy research beyond end users

Y Acar, S Fahl, ML Mazurek - 2016 IEEE Cybersecurity …, 2016 - ieeexplore.ieee.org
While researchers have developed many tools, techniques, and protocols for improving
software security, exploits and breaches are only becoming more frequent. Some of this gap …

A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

Measuring {HTTPS} adoption on the web

AP Felt, R Barnes, A King, C Palmer, C Bentzel… - 26th USENIX security …, 2017 - usenix.org
HTTPS ensures that the Web has a base level of privacy and integrity. Security engineers,
researchers, and browser vendors have long worked to spread HTTPS to as much of the …

An investigation of phishing awareness and education over time: When and how to best remind users

B Reinheimer, L Aldag, P Mayer, M Mossano… - … Symposium on Usable …, 2020 - usenix.org
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …

Toggles, dollar signs, and triangles: How to (in) effectively convey privacy choices with icons and link texts

H Habib, Y Zou, Y Yao, A Acquisti, L Cranor… - Proceedings of the …, 2021 - dl.acm.org
Increasingly, icons are being proposed to concisely convey privacy-related information and
choices to users. However, complex privacy concepts can be difficult to communicate. We …

The nudge puzzle: matching nudge interventions to cybersecurity decisions

V Zimmermann, K Renaud - ACM Transactions on Computer-Human …, 2021 - dl.acm.org
Nudging is a promising approach, in terms of influencing people to make advisable choices
in a range of domains, including cybersecurity. However, the processes underlying the …

Adapting security warnings to counter online disinformation

B Kaiser, J Wei, E Lucherini, K Lee, JN Matias… - 30th USENIX Security …, 2021 - usenix.org
Disinformation is proliferating on the internet, and platforms are responding by attaching
warnings to content. There is little evidence, however, that these warnings help users …

" If HTTPS Were Secure, I Wouldn't Need 2FA"-End User and Administrator Mental Models of HTTPS

K Krombholz, K Busse, K Pfeffer… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
HTTPS is one of the most important protocols used to secure communication and is,
fortunately, becoming more pervasive. However, especially the long tail of websites is still …

Obstacles to the adoption of secure communication tools

R Abu-Salma, MA Sasse, J Bonneau… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
The computer security community has advocated widespread adoption of secure
communication tools to counter mass surveillance. Several popular personal communication …

{End-to-End} measurements of email spoofing attacks

H Hu, G Wang - 27th USENIX Security Symposium (USENIX Security …, 2018 - usenix.org
Spear phishing has been a persistent threat to users and organizations, and yet email
providers still face key challenges to authenticate incoming emails. As a result, attackers can …