Iterative design, implementation, and evaluation of prototype systems is a common approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …
Given the difficulties of studying the shoulder surfing resistance of authentication systems in a live setting, researchers often ask study participants to shoulder surf authentications by …
K Busse, M Tahaei, K Krombholz… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Payment cultures around the globe are diverse and have significant implications on security, privacy and trust. We study usable security aspects of payment cultures in four culturally …
In situ evaluations of novel authentication systems, where the system is evaluated in its intended usage context, are often infeasible due to ethical and legal constraints …
AA Hasegawa, D Inoue, M Akiyama - 33rd USENIX Security Symposium, 2024 - usenix.org
In human factor fields such as human-computer interaction (HCI) and psychology, researchers have been concerned that participants mostly come from WEIRD (Western …
Immersive technologies, including augmented and virtual reality (AR & VR) devices, have enhanced digital communication along with a considerable increase in digital threats. Thus …
AA Hasegawa, D Inoue, M Akiyama - arXiv preprint arXiv:2305.05004, 2023 - arxiv.org
In human factor fields such as human-computer interaction (HCI) and psychology, researchers have been concerned that participants mostly come from WEIRD (Western …
A Dalela, S Giallorenzo, O Kulyk… - Usable Security and …, 2022 - ndss-symposium.org
Increased levels of digitalization in society expose companies to new security threats, requiring them to establish adequate security and privacy measures. Additionally, the …
M Casimiro, J Segel, L Li, Y Wang, LF Cranor - Who Are You, 2020 - wayworkshop.org
Abstract Personal Identification Numbers (PINs), required to authenticate on a multitude of devices, are ubiquitous nowadays. To increase the security and safety of their assets, users …