A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

Prototyping usable privacy and security systems: Insights from experts

F Mathis, K Vaniea, M Khamis - International Journal of Human …, 2022 - Taylor & Francis
Iterative design, implementation, and evaluation of prototype systems is a common
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …

Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research

F Mathis, J O'Hagan, M Khamis… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Given the difficulties of studying the shoulder surfing resistance of authentication systems in
a live setting, researchers often ask study participants to shoulder surf authentications by …

Cash, cards or cryptocurrencies? A study of payment culture in four countries

K Busse, M Tahaei, K Krombholz… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Payment cultures around the globe are diverse and have significant implications on security,
privacy and trust. We study usable security aspects of payment cultures in four culturally …

Can i borrow your atm? using virtual reality for (simulated) in situ authentication research

F Mathis, K Vaniea, M Khamis - … on Virtual Reality and 3D User …, 2022 - ieeexplore.ieee.org
In situ evaluations of novel authentication systems, where the system is evaluated in its
intended usage context, are often infeasible due to ethical and legal constraints …

[PDF][PDF] How WEIRD is Usable Privacy and Security Research?

AA Hasegawa, D Inoue, M Akiyama - 33rd USENIX Security Symposium, 2024 - usenix.org
In human factor fields such as human-computer interaction (HCI) and psychology,
researchers have been concerned that participants mostly come from WEIRD (Western …

Towards secure and usable authentication for augmented and virtual reality head-mounted displays

R Duezguen, P Mayer, S Das, M Volkamer - arXiv preprint arXiv …, 2020 - arxiv.org
Immersive technologies, including augmented and virtual reality (AR & VR) devices, have
enhanced digital communication along with a considerable increase in digital threats. Thus …

How WEIRD is Usable Privacy and Security Research?(Extended Version)

AA Hasegawa, D Inoue, M Akiyama - arXiv preprint arXiv:2305.05004, 2023 - arxiv.org
In human factor fields such as human-computer interaction (HCI) and psychology,
researchers have been concerned that participants mostly come from WEIRD (Western …

[PDF][PDF] A study on security and privacy practices in Danish companies

A Dalela, S Giallorenzo, O Kulyk… - Usable Security and …, 2022 - ndss-symposium.org
Increased levels of digitalization in society expose companies to new security threats,
requiring them to establish adequate security and privacy measures. Additionally, the …

[PDF][PDF] A quest for inspiration: How users create and reuse PINs

M Casimiro, J Segel, L Li, Y Wang, LF Cranor - Who Are You, 2020 - wayworkshop.org
Abstract Personal Identification Numbers (PINs), required to authenticate on a multitude of
devices, are ubiquitous nowadays. To increase the security and safety of their assets, users …