A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones

H Farzand, M Abraham, S Brewster… - … Journal of Human …, 2024 - Taylor & Francis
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …

[PDF][PDF] Beyond Mute and Block: Adoption and Effectiveness of Safety Tools in Social VR, from Ubiquitous Harassment to Social Sculpting

M Weerasinghe, S Macdonald, C Fiani… - IEEE Transactions on …, 2025 - mkhamis.com
Harassment in Social Virtual Reality (SVR) is a growing concern. The current SVR
landscape features inconsistent access to non-standardised safety features, with minimal …

Where Do You Look When Unlocking Your Phone?: A Field Study of Gaze Behaviour During Smartphone Unlock

Y Abdrabou, T Omelina, F Dietz, M Khamis… - Extended Abstracts of …, 2024 - dl.acm.org
Eye gaze has emerged as a promising avenue for implicit authentication/identification on
smartphones, offering the potential for seamless user identification and two-factor …

[PDF][PDF] 4.6 Towards Collaborations in Social Engineering Research

NL Funding - … and Fortifying Against Cognitive Vulnerabilities in … - drops.dagstuhl.de
Objective This session aimed to identify specific topics and areas of collaboration.
Methodology For this session, a poster was created for each research question participants …