No abstract available.
Proceeding Downloads
Risks of Mobile Ambient Sensors and User Awareness, Concerns, and Preferences
Abstract: Ambient sensors are being integrated within modern technologies such as mobile, smart buildings, and smart medical devices. Despite the real risks of such sensors, it is hard for users to understand and control such sensor readings since these ...
SOK: Young Children's Cybersecurity Knowledge, Skills & Practice: A Systematic Literature Review
The rise in children's use of digital technology highlights the need for them to learn to act securely online. Cybersecurity skills require mature cognitive abilities which children only acquire after they start using technology. As such, this paper ...
What Cookie Consent Notices Do Users Prefer: A Study In The Wild
Laws like GDPR in the EU mandated all websites operating in their jurisdiction to obtain users’ informed consent before tracking those users and collecting their data. Today, this is achieved by showing users cookie consent notices. These notices are ...
“I just want to play games with friends and it asked me for all of my information”: Trading privacy for connection during the COVID-19 pandemic
We conducted 22 semi-structured interviews with participants in the early stages of the COVID-19 pandemic when restrictions were in effect, to learn about social media users’ privacy behaviors and what influenced changes in behavior since the beginning ...
ENAGRAM: An App to Evaluate Preventative Nudges for Instagram
Online self-disclosure is perhaps one of the last decade’s most studied communication processes, thanks to the introduction of Online Social Networks (OSNs) like Facebook. Self-disclosure research has contributed significantly to the design of ...
Exploring Deceptive Design Patterns in Voice Interfaces
Deceptive design patterns (sometimes called “dark patterns”) are user interface design elements that may trick, deceive, or mislead users into behaviors that often benefit the party implementing the design over the end user. Prior work has taxonomized, ...
Vision: Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate Problems
Security and privacy issues are an ever-increasing problem for software systems. To address them, software developers must anticipate the problems that their developed systems may face, using a process we call ‘threat assessment’. Unfortunately, given ...
Shoulder Surfing through the Social Lens: A Longitudinal Investigation & Insights from an Exploratory Diary Study
Shoulder surfing is a prevailing threat when accessing information on personal devices like smartphones. Adequate mitigation requires studying shoulder surfing occurrences in people’s daily lives. In this paper, we confirm and extend previous research ...
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home
- Jacob Abbott,
- Jayati Dev,
- Donginn Kim,
- Shakthidhar Gopavaram,
- Meera Iyer,
- Shivani Sadam,
- Shrirang Mare,
- Tatiana Ringenberg,
- Vafa Andalibi,
- L. Jean Camp
Studies of privacy perception in the Internet of Things (IoT) include in-laboratory evaluations as well as investigations of purchase decisions, deployment, and long-term use. In this study, we implemented identical IoT configurations in eight ...
Vision: Usable Privacy for XR in the Era of the Metaverse
Extended Reality (XR) — an umbrella term for Augmented Reality (AR), Virtual Reality (VR) and Mixed Reality (MR) — has penetrated the consumer market and is prone to increasingly impact our lives in the near future. Various devices, e.g., MR glasses, AR ...
Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration
Health data is considered to be sensitive and personal; both governments and software platforms have enacted specific measures to protect it. Consumer apps that collect health data are becoming more popular, but raise new privacy concerns as they ...
Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors
We face certificate validation errors commonly, yet the related tools and documentation had been shown to have very poor usability. Previous research suggests that just improving the error messages and corresponding documentation can have significantly ...
Vision: Too Little too Late? Do the Risks of FemTech already Outweigh the Benefits?
Abstract: Female-oriented technologies (FemTech) promise to enable women to take control of their bodies and lives, helping them overcome the many existing challenges in medical care and research. From lack of data about women in general, to bias and ...
Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption
Business disruption from cyber-attacks is a recognized and growing concern, yet the uptake of cyber insurance has been substantially lower than expected. This study aimed to identify what factors may be influencing perceptions and uptake of cyber ...
Phishing with Malicious QR Codes
The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world. That changed overnight, as the QR codes became a convenient go-between for sharing URLs, including malicious ones. This opens an attractive new way of phishing as ...
“It’s Just a Lot of Prerequisites”: A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator
Two-factor authentication (2FA) overcomes the insecurity of passwords by adding a second factor to the authentication process. A variant of 2FA, which is even phishing-resistant unlike, e.g., SMS-based implementations, is offered by the FIDO2 protocol. ...
Meaningful Context, a Red Flag, or Both? Preferences for Enhanced Misinformation Warnings Among US Twitter Users
Warning users about misinformation on social media is not a simple usability task. Soft moderation has to balance between debunking falsehoods and avoiding moderation bias while preserving the social media consumption flow. Platforms thus employ ...
Caring About IoT-Security – An Interview Study in the Healthcare Sector
- Marco Gutfleisch,
- Markus SchöPs,
- Jonas Hielscher,
- Mary Cheney,
- Sibel Sayin,
- Nathalie Schuhmacher,
- Ali Mohamad,
- M. Angela Sasse
The number of medical IoT devices is increasing rapidly: CT scanners, ECG devices, insulin pumps and other devices, which previously operated independently, are being interconnected with other devices, now sharing patient data and/or uploading them to ...
Investigating the Effectiveness of Personalized Content in the Form of Videos When Promoting a TOR Browser
Due to increasing trend of data collection by websites, the use of privacy-enhancing technologies is becoming more and more important in our digital age. However, widespread adoption of tools that provide strongest protection, such as a TOR browser, has ...
Index Terms
- Proceedings of the 2022 European Symposium on Usable Security