" Would you give the same priority to the bank and a game? I do {not!}" exploring credential management strategies and obstacles during password manager setup

S Klivan, S Höltervennhoff, N Huaman, Y Acar… - … Symposium on Usable …, 2023 - usenix.org
Password managers allow users to improve password security by handling large numbers of
strong and unique passwords without the burden of memorizing them. While users are …

Improving students argumentation learning with adaptive self-evaluation nudging

T Wambsganss, A Janson, T Käser… - Proceedings of the ACM …, 2022 - dl.acm.org
Recent advantages from computational linguists can be leveraged to nudge students with
adaptive self-evaluation based on their argumentation skill level. To investigate how …

Tailoring a persuasive game to promote secure smartphone behaviour

A Ganesh, C Ndulue, R Orji - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
The use of smartphones has become an integral part of everyone's lives. Due to the
ubiquitous nature and multiple functionalities of smartphones, the data handled by these …

GRA-PIN: A graphical and PIN-based hybrid authentication approach for smart devices

N Kausar, IU Din, MA Khan, A Almogren, BS Kim - Sensors, 2022 - mdpi.com
In many smart devices and numerous digital applications, authentication mechanisms are
widely used to validate the legitimacy of users' identification. As a result of the increased use …

Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations

A Constantinides, M Belk, C Fidas, R Beumers… - ACM Transactions on …, 2023 - dl.acm.org
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …

GestureMeter: Design and Evaluation of a Gesture Password Strength Meter

E Cheon, JH Huh, I Oakley - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
Gestures drawn on touchscreens have been proposed as an authentication method to
secure access to smartphones. They provide good usability and a theoretically large …

TIM: Secure and usable authentication for smartphones

GC Yang, Q Hu, MR Asghar - Journal of information security and …, 2022 - Elsevier
With the widespread popularity of smartphones and mobile applications, they have
gradually penetrated and are widely used in our daily lives, eg, we use them for online …

The tables have turned: GPT-3 distinguishing passwords from honeywords

N Chakraborty, Y Yamout… - 2023 IEEE Conference …, 2023 - ieeexplore.ieee.org
In the field of information security, there has been a noteworthy trend toward leveraging
machine learning models to develop and exploit security solutions. The emergence of …

Smartphone security and privacy–a gamified persuasive approach with protection motivation theory

A Ganesh, C Ndulue, R Orji - International Conference on Persuasive …, 2022 - Springer
Mobile phones have evolved from feature phones to smartphones with comparable power
as modern desktops. On the other hand, security and privacy have taken a toll and, users …

Turn & slide: Designing a puzzle game to Elicit the visualizer-verbalizer cognitive style

S Petsas, GE Raptis, C Katsanos - IFIP Conference on Human-Computer …, 2023 - Springer
Cognitive theories suggest that people differ in processing information, reflecting their
different cognitive styles. Research in Human-Computer Interaction has revealed that …