You are not your developer, either: A research agenda for usable security and privacy research beyond end users
While researchers have developed many tools, techniques, and protocols for improving
software security, exploits and breaches are only becoming more frequent. Some of this gap …
software security, exploits and breaches are only becoming more frequent. Some of this gap …
A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
Measuring {HTTPS} adoption on the web
HTTPS ensures that the Web has a base level of privacy and integrity. Security engineers,
researchers, and browser vendors have long worked to spread HTTPS to as much of the …
researchers, and browser vendors have long worked to spread HTTPS to as much of the …
An investigation of phishing awareness and education over time: When and how to best remind users
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …
organisations. However, their effectiveness over time and, correspondingly, appropriate …
Toggles, dollar signs, and triangles: How to (in) effectively convey privacy choices with icons and link texts
Increasingly, icons are being proposed to concisely convey privacy-related information and
choices to users. However, complex privacy concepts can be difficult to communicate. We …
choices to users. However, complex privacy concepts can be difficult to communicate. We …
The nudge puzzle: matching nudge interventions to cybersecurity decisions
Nudging is a promising approach, in terms of influencing people to make advisable choices
in a range of domains, including cybersecurity. However, the processes underlying the …
in a range of domains, including cybersecurity. However, the processes underlying the …
Adapting security warnings to counter online disinformation
Disinformation is proliferating on the internet, and platforms are responding by attaching
warnings to content. There is little evidence, however, that these warnings help users …
warnings to content. There is little evidence, however, that these warnings help users …
" If HTTPS Were Secure, I Wouldn't Need 2FA"-End User and Administrator Mental Models of HTTPS
HTTPS is one of the most important protocols used to secure communication and is,
fortunately, becoming more pervasive. However, especially the long tail of websites is still …
fortunately, becoming more pervasive. However, especially the long tail of websites is still …
Obstacles to the adoption of secure communication tools
The computer security community has advocated widespread adoption of secure
communication tools to counter mass surveillance. Several popular personal communication …
communication tools to counter mass surveillance. Several popular personal communication …
{End-to-End} measurements of email spoofing attacks
Spear phishing has been a persistent threat to users and organizations, and yet email
providers still face key challenges to authenticate incoming emails. As a result, attackers can …
providers still face key challenges to authenticate incoming emails. As a result, attackers can …