Replication: How well do my results generalize now? The external validity of online privacy and security surveys

J Tang, E Birrell, A Lerner - … symposium on usable privacy and security …, 2022 - usenix.org
Privacy and security researchers often rely on data collected through online crowdsourcing
platforms such as Amazon Mechanical Turk (MTurk) and Prolific. Prior work---which used …

An overview of phishing victimization: Human factors, training and the role of emotions

M Jari - arXiv preprint arXiv:2209.11197, 2022 - arxiv.org
Phishing is a form of cybercrime and a threat that allows criminals, phishers, to deceive end
users in order to steal their confidential and sensitive information. Attackers usually attempt …

A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead

C Reuter, LL Iacono, A Benlian - Behaviour & Information …, 2022 - Taylor & Francis
In the last decades, research has shown that both technical solutions and user perceptions
are important to improve security and privacy in the digital realm. The field of 'usable …

[HTML][HTML] Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection

Y Yuan, G Apruzzese, M Conti - Computers & Security, 2025 - Elsevier
Phishing attacks are on the rise, and phishing websites are everywhere, denoting the
brittleness of security mechanisms reliant on blocklists. To cope with this threat, many works …

[PDF][PDF] Phishing awareness and education–When to best remind

B Berens, K Dimitrova, M Mossano… - Workshop on Usable …, 2022 - ndss-symposium.org
The use of security awareness and education pro-grammes is very common in
organisations. But how effective are they over time? Some initial research on this question …

[PDF][PDF] How WEIRD is Usable Privacy and Security Research?

AA Hasegawa, D Inoue, M Akiyama - 33rd USENIX Security Symposium, 2024 - usenix.org
In human factor fields such as human-computer interaction (HCI) and psychology,
researchers have been concerned that participants mostly come from WEIRD (Western …

Understanding {Non-Experts'} Security-and {Privacy-Related} Questions on a {Q&A} Site

AA Hasegawa, N Yamashita, T Mori, D Inoue… - … Symposium on Usable …, 2022 - usenix.org
Non-expert users are often forced to make decisions about security and privacy in their daily
lives. Prior research has shown that non-expert users ask strangers for advice about digital …

Understanding the viability of gmail's origin indicator for identifying the sender

E Liu, L Sun, A Bellon, G Ho, GM Voelker… - … Symposium on Usable …, 2023 - usenix.org
The current design of email authentication mechanisms has made it challenging for email
providers to establish the authenticity of email messages with complicated provenance, such …

{FakeBehalf}: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems

J Ma, L Chen, K Xue, B Luo, X Huang, M Ai… - 33rd USENIX Security …, 2024 - usenix.org
Email has become an essential service for global communication. In email protocols, a
Delegation Mechanism allows emails to be sent by other entities on behalf of the email …

Security and Privacy Experiences of First-and Second-Generation Pakistani Immigrants to the US: Perceptions, Practices, Challenges, and Parent-Child Dynamics

W Usman, J Sadik, R Elgedawy, S Ruoti… - 2025 IEEE Symposium …, 2024 - computer.org
This work explores the security and privacy perceptions, practices, and challenges Pakistani
immigrants face in the US. We also explore how parent-child dynamics affect immigrants' …