You are not your developer, either: A research agenda for usable security and privacy research beyond end users

Y Acar, S Fahl, ML Mazurek - 2016 IEEE Cybersecurity …, 2016 - ieeexplore.ieee.org
While researchers have developed many tools, techniques, and protocols for improving
software security, exploits and breaches are only becoming more frequent. Some of this gap …

On anonymity in an electronic society: A survey of anonymous communication systems

M Edman, B Yener - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
The past two decades have seen a growing interest in methods for anonymous
communication on the Internet, both from the academic community and the general public …

Stories from survivors: Privacy & security practices when coping with intimate partner abuse

T Matthews, K O'Leary, A Turner, M Sleeper… - Proceedings of the …, 2017 - dl.acm.org
We present a qualitative study of the digital privacy and security motivations, practices, and
challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for …

A first look at the usability of bitcoin key management

S Eskandari, J Clark, D Barrera, E Stobert - arXiv preprint arXiv …, 2018 - arxiv.org
Bitcoin users are directly or indirectly forced to deal with public key cryptography, which has
a number of security and usability challenges that differ from the password-based …

[图书][B] Usable security: History, themes, and challenges

S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …

Surveillance intermediaries

AZ Rozenshtein - Stan. L. Rev., 2018 - HeinOnline
Apple's high-profile 2016 fight with the FBI, in which the company challenged a court order
commanding it to help unlock the iPhone of one of the San Bernardino terrorists, exemplifies …

Dissent in numbers: Making strong anonymity scale

DI Wolinsky, H Corrigan-Gibbs, B Ford… - 10th USENIX Symposium …, 2012 - usenix.org
Current anonymous communication systems make a trade-off between weak anonymity
among many nodes, via onion routing, and strong anonymity among few nodes, via DC …

Why can't johnny fix vulnerabilities: A usability evaluation of static analysis tools for security

J Smith, LNQ Do, E Murphy-Hill - Sixteenth Symposium on Usable …, 2020 - usenix.org
Static analysis tools can help prevent security incidents, but to do so, they must enable
developers to resolve the defects they detect. Unfortunately, developers often struggle to …

Exploring design and governance challenges in the development of privacy-preserving computation

N Agrawal, R Binns, M Van Kleek, K Laine… - Proceedings of the …, 2021 - dl.acm.org
Homomorphic encryption, secure multi-party computation, and differential privacy are part of
an emerging class of Privacy Enhancing Technologies which share a common promise: to …

Investigating influencer VPN ads on YouTube

O Akgul, R Roberts, M Namara, D Levin… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
One widespread, but frequently overlooked, source of security information is influencer
marketing ads on YouTube for security and privacy products such as VPNs. This paper …