23 ways to nudge: A review of technology-mediated nudging in human-computer interaction

A Caraban, E Karapanos, D Gonçalves… - Proceedings of the 2019 …, 2019 - dl.acm.org
Ten years ago, Thaler and Sunstein introduced the notion of nudging to talk about how
subtle changes in the'choice architecture'can alter people's behaviors in predictable ways …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Memory manipulations in extended reality

E Bonnail, WJ Tseng, M Mcgill, E Lecolinet… - Proceedings of the …, 2023 - dl.acm.org
Human memory has notable limitations (eg, forgetting) which have necessitated a variety of
memory aids (eg, calendars). As we grow closer to mass adoption of everyday Extended …

A Deep Dive into User's Preferences and Behavior around Mobile Phone Sharing

R Paudel, P Dumaru, A Shrestha, H Kocabas… - Proceedings of the …, 2023 - dl.acm.org
Users share their personal devices with different entities in various circumstances. While
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …

Improving password memorability, while not inconveniencing the user

N Woods, M Siponen - International Journal of Human-Computer Studies, 2019 - Elsevier
Passwords are the most frequently used authentication mechanism. However, due to
increased password numbers, there has been an increase in insecure password behaviors …

We don't give a second thought before providing our information: understanding users' perceptions of information collection by apps in Urban Bangladesh

MN Al-Ameen, T Tamanna, S Nandy… - Proceedings of the 3rd …, 2020 - dl.acm.org
With a rapid increase in the use of digital technologies, people in the Global South including
Bangladesh are exposed to a wide-range of smartphone applications (termed as apps in …

The emperor's new password creation policies: An evaluation of leading web services and the effect of role in resisting against online guessing

D Wang, P Wang - Computer Security--ESORICS 2015: 20th European …, 2015 - Springer
While much has changed in Internet security over the past decades, textual passwords
remain as the dominant method to secure user web accounts and they are proliferating in …

Optiwords: A new password policy for creating memorable and strong passwords

Y Guo, Z Zhang, Y Guo - Computers & Security, 2019 - Elsevier
User-generated textual passwords suffer from the conflict between security and usability.
System administrators usually adopt password composition policies to help users choose …

Nudging personalized password policies by understanding users' personality

Y Guo, Z Zhang, Y Guo, X Guo - Computers & Security, 2020 - Elsevier
Password composition policies are used to prevent users from picking weak passwords. A
website usually provides a unified password policy for each user but ignores the fact that …

Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks

LA Adebimpe, IO Ng, MYI Idris, M Okmi, CS Ku… - Applied Sciences, 2023 - mdpi.com
The rapid advancement of information technology (IT) has given rise to a new era of efficient
and fast communication and transactions. However, the increasing adoption of and reliance …