A survey on developer-centred security

M Tahaei, K Vaniea - 2019 IEEE European Symposium on …, 2019 - ieeexplore.ieee.org
Software developers are key players in the security ecosystem as they produce code that
runs on millions of devices. Yet we continue to see insecure code being developed and …

[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

Control versus effort in privacy warnings for webforms

K Krol, S Preibusch - Proceedings of the 2016 ACM on Workshop on …, 2016 - dl.acm.org
Webforms are the primary way of collecting information online. However, some users may
wish to limit the amount of personal information they provide and only fill out the minimum …

Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework

R Heartfield, G Loukas - Computers & Security, 2018 - Elsevier
The notion that the human user is the weakest link in information security has been strongly,
and, we argue, rightly contested in recent years. Here, we take a step further showing that …

Creative persuasion: a study on adversarial behaviors and strategies in phishing attacks

P Rajivan, C Gonzalez - Frontiers in psychology, 2018 - frontiersin.org
Success of phishing attacks depend on effective exploitation of human weaknesses. This
research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior …

Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse

S Parkin, T Patel, I Lopez-Neira, L Tanczer - Proceedings of the new …, 2019 - dl.acm.org
The use of Internet of Things (IoT) devices is an emerging trend for citizens. These devices
may have implications for the security of various areas of life; for survivors of technology …

Of two minds about {Two-Factor}: Understanding everyday {FIDO}{U2F} usability through device comparison and experience sampling

S Ciolino, S Parkin, P Dunphy - … on Usable Privacy and Security (SOUPS …, 2019 - usenix.org
Security keys are phishing-resistant two-factor authentication (2FA) tokens based upon the
FIDO Universal 2nd Factor (U2F) standard. Prior research on security keys has revealed …

Cyber security fear appeals: Unexpectedly complicated

K Renaud, M Dupuis - Proceedings of the new security paradigms …, 2019 - dl.acm.org
Cyber security researchers are starting to experiment with fear appeals, with a wide variety
of designs and reported efficaciousness. This makes it hard to derive recommendations for …

Be more transparent and users will like you: A robot privacy and user experience design experiment

J Vitale, M Tonkin, S Herse, S Ojha, J Clark… - Proceedings of the …, 2018 - dl.acm.org
Robots interacting with humans in public spaces often need to collect users' private
information in order to provide the required services. Current privacy legislation in major …

The security blanket of the chat world: An analytic evaluation and a user study of telegram

R Abu-Salma, K Krol, S Parkin, V Koh, K Kwan… - 2017 - discovery.ucl.ac.uk
The computer security community has advocated widespread adoption of secure
communication tools to protect personal privacy. Several popular communication tools have …