The nudge puzzle: matching nudge interventions to cybersecurity decisions

V Zimmermann, K Renaud - ACM Transactions on Computer-Human …, 2021 - dl.acm.org
Nudging is a promising approach, in terms of influencing people to make advisable choices
in a range of domains, including cybersecurity. However, the processes underlying the …

Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites

AS Albesher - Sustainability, 2023 - mdpi.com
A sustainable online environment is essential to protecting businesses from abuse and data
breaches. To protect sustainability, websites' authentication procedures should continuously …

The security & privacy acceptance framework (spaf)

S Das, C Faklaris, JI Hong… - Foundations and Trends …, 2022 - nowpublishers.com
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …

Don't accept all and continue: Exploring nudges for more deliberate interaction with tracking consent notices

N Gerber, A Stöver, J Peschke… - ACM Transactions on …, 2023 - dl.acm.org
Legal frameworks rely on users to make an informed decision about data collection, eg, by
accepting or declining the use of tracking technologies. In practice, however, users hardly …

Hybrid password meters for more secure passwords–a comprehensive study of password meters including nudges and password information

V Zimmermann, K Marky, K Renaud - Behaviour & Information …, 2023 - Taylor & Francis
Supporting users with secure password creation is a well-explored yet unresolved research
topic. A promising intervention is the password meter, ie providing feedback on the user's …

Misinformation and disinformation in the era of covid-19: The role of primary information sources and the development of attitudes toward vaccination

M Dupuis, K Chhor, N Ly - Proceedings of the 22nd Annual Conference …, 2021 - dl.acm.org
Misinformation is not new; however, the proliferation of social media has resulted in a much
broader reach and instantaneous impact. Results from such proliferation were seen during …

Closing the feedback loop between UX design, software development, security engineering, and operations

J Nguyen, M Dupuis - Proceedings of the 20th Annual SIG Conference …, 2019 - dl.acm.org
There have been many evolutions of the software development lifecycle (SDLC). These
differing models have moved software development groups from sequential development to …

Gazemeter: Exploring the usage of gaze behaviour to enhance password assessments

Y Abdrabou, A Shams, MO Mantawy… - ACM Symposium on …, 2021 - dl.acm.org
We investigate the use of gaze behaviour as a means to assess password strength as
perceived by users. We contribute to the effort of making users choose passwords that are …

The use and non-use of cybersecurity tools among consumers: Do they want help?

M Dupuis, T Geiger, M Slayton, F Dewing - Proceedings of the 20th …, 2019 - dl.acm.org
Cybersecurity behavior changes over time, as do the recommendations for how one may
best protect themselves from cybersecurity threats. This paper examines current trends in …

Scaring people is not enough: an examination of fear appeals within the context of promoting good password hygiene

M Dupuis, A Jennings, K Renaud - … of the 22nd Annual Conference on …, 2021 - dl.acm.org
Fear appeals have been used for thousands of years to scare people into engaging in a
specific behavior or omitting an existing one. From religion, public health campaigns …