Understanding password choices: How frequently entered passwords are re-used across websites

R Wash, E Rader, R Berman, Z Wellmer - Twelfth Symposium on Usable …, 2016 - usenix.org
From email to online banking, passwords are an essential component of modern internet
use. Yet, users do not always have good password security practices, leaving their accounts …

An empirical study of a decentralized identity wallet: Usability, security, and perspectives on user control

M Korir, S Parkin, P Dunphy - … symposium on usable privacy and security …, 2022 - usenix.org
User-centric digital identity initiatives are emerging with a mission to shift control over online
identity disclosures to the individual. However, there is little representation of prospective …

[HTML][HTML] The design and evaluation of adaptive biometric authentication systems: Current status, challenges and future direction

R Ryu, S Yeom, D Herbert, J Dermoudy - ICT Express, 2023 - Elsevier
Biometric authentication systems may suffer from decreasing recognition performance due
to varying environmental conditions and sample ageing, which cause intra-class variability …

Of two minds about {Two-Factor}: Understanding everyday {FIDO}{U2F} usability through device comparison and experience sampling

S Ciolino, S Parkin, P Dunphy - … on Usable Privacy and Security (SOUPS …, 2019 - usenix.org
Security keys are phishing-resistant two-factor authentication (2FA) tokens based upon the
FIDO Universal 2nd Factor (U2F) standard. Prior research on security keys has revealed …

Exploring the stability of behavioral biometrics in virtual reality in a remote field study: Towards implicit and continuous user identification through body movements

J Liebers, C Burschik, U Gruenefeld… - Proceedings of the 29th …, 2023 - dl.acm.org
Behavioral biometrics has recently become a viable alternative method for user identification
in Virtual Reality (VR). Its ability to identify users based solely on their implicit interaction …

“taking out the trash”: Why security behavior change requires intentional forgetting

J Hielscher, A Kluge, U Menges… - Proceedings of the 2021 …, 2021 - dl.acm.org
Security awareness is big business–virtually every organization in the Western world
provides some form of awareness or training, mostly bought from external vendors …

Free-form gesture authentication in the wild

Y Yang, GD Clark, J Lindqvist, A Oulasvirta - Proceedings of the 2016 …, 2016 - dl.acm.org
Free-form gesture passwords have been introduced as an alternative mobile authentication
method. Text passwords are not very suitable for mobile interaction, and methods such as …

A Comparative Long-Term Study of Fallback Authentication Schemes

L Lassak, P Markert, M Golla, E Stobert… - Proceedings of the CHI …, 2024 - dl.acm.org
Fallback authentication, the process of re-establishing access to an account when the
primary authenticator is unavailable, holds critical significance. Approaches range from …

Electronic identity services as sociotechnical and political-economic constructs

J Van Dijck, B Jacobs - New media & society, 2020 - journals.sagepub.com
Electronic identification services (eIDs) have become strategic services in the global
governance of online societies. In this article, we argue that eIDs are sociotechnical …

Cybersecurity incident response capabilities in the Ecuadorian financial sector

FE Catota, MG Morgan, DC Sicker - Journal of Cybersecurity, 2018 - academic.oup.com
Cyber-threats have been successfully targeting the financial sector worldwide. While much
of the efforts and resources to address the risk imposed by these cyber threats are directed …