Privacy, safety, and security in extended reality: user experience challenges for neurodiverse users

D Jones, S Ghasemi, D Gračanin, M Azab - International Conference on …, 2023 - Springer
Neurodevelopmental disorders are a group of disorders that affect the development of the
nervous system, leading to abnormal brain function, which may affect emotion, learning …

From utility to capability: a new paradigm to conceptualize and develop inclusive pets

P Das Chowdhury, A Domínguez Hernández… - Proceedings of the …, 2022 - dl.acm.org
The wider adoption of Privacy Enhancing Technologies (PETs) has relied on usability
studies–which focus mainly on an assessment of how a specified group of users interface, in …

[HTML][HTML] Would US citizens accept cybersecurity deresponsibilization? Perhaps not

K Renaud, K Van Der Schyff, S MacDonald - Computers & Security, 2023 - Elsevier
Responsibilizing governments provide advice about how to manage a variety of risks. If
citizens do not heed the advice and things go wrong, they are expected to accept the …

“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods

A Erinola, A Buckmann, J Friedauer… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
According to the World Health organization, about 16% of the world's population live with a
disability. While they could benefit from digital products and services, users with disabilities …

'Ought'should not assume 'Can'? Basic Capabilities in Cybersecurity to Ground Sen's Capability Approach

P Das Chowdhury, K Renaud - Proceedings of the 2023 New Security …, 2023 - dl.acm.org
We inhabit a 'digital first'society, which is only viable if everyone, regardless of ability and
capacity, is able to benefit from online offerings in a safe and secure way. However, disabled …

Assessing Suspicious Emails with Banner Warnings Among Blind and {Low-Vision} Users in Realistic Settings

F Sharevski, A Zeidieh - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
Warning users about suspicious emails usually happens through visual interventions such
as banners. Evidence from laboratory experiments shows that email banner warnings are …

[HTML][HTML] Cybersecurity insights gleaned from world religions

K Renaud, M Dupuis - Computers & Security, 2023 - Elsevier
Organisations craft and disseminate security policies, encoding the actions they want
employees to take to preserve and protect organisational information resources. They …

Password Managers Use Among Individuals Who Are Visually Impaired: Awareness, Adoption, and Rejection

N Alajarmeh, RE Ladner - International Journal of Human …, 2024 - Taylor & Francis
Little research has examined the aspects of PMs' use among individuals who are blind or
visually impaired (BVI) who face extra challenges while entering credentials, such as low …

[HTML][HTML] Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study

D Portela, D Nogueira-Leite, R Almeida… - JMIR Formative …, 2023 - formative.jmir.org
Background: Over the last decade, the frequency and size of cyberattacks in the health care
industry have increased, ranging from breaches of processes or networks to encryption of …

Digital Security—A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups

F Herbert, S Becker, A Buckmann… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
This paper investigates the digital security experiences of four at-risk user groups in
Germany, including older adults (70+), teenagers (14-17), people with migration …