skip to main content
10.1145/3549015acmotherconferencesBook PagePublication PageseurousecConference Proceedingsconference-collections
EuroUSEC '22: Proceedings of the 2022 European Symposium on Usable Security
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
EuroUSEC 2022: 2022 European Symposium on Usable Security Karlsruhe Germany September 29 - 30, 2022
ISBN:
978-1-4503-9700-1
Published:
29 September 2022

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Security Awareness
research-article
Risks of Mobile Ambient Sensors and User Awareness, Concerns, and Preferences

Abstract: Ambient sensors are being integrated within modern technologies such as mobile, smart buildings, and smart medical devices. Despite the real risks of such sensors, it is hard for users to understand and control such sensor readings since these ...

research-article
SOK: Young Children's Cybersecurity Knowledge, Skills & Practice: A Systematic Literature Review

The rise in children's use of digital technology highlights the need for them to learn to act securely online. Cybersecurity skills require mature cognitive abilities which children only acquire after they start using technology. As such, this paper ...

research-article
What Cookie Consent Notices Do Users Prefer: A Study In The Wild

Laws like GDPR in the EU mandated all websites operating in their jurisdiction to obtain users’ informed consent before tracking those users and collecting their data. Today, this is achieved by showing users cookie consent notices. These notices are ...

research-article
“I just want to play games with friends and it asked me for all of my information”: Trading privacy for connection during the COVID-19 pandemic

We conducted 22 semi-structured interviews with participants in the early stages of the COVID-19 pandemic when restrictions were in effect, to learn about social media users’ privacy behaviors and what influenced changes in behavior since the beginning ...

SESSION: Cybersecurity Behaviours
research-article
ENAGRAM: An App to Evaluate Preventative Nudges for Instagram

Online self-disclosure is perhaps one of the last decade’s most studied communication processes, thanks to the introduction of Online Social Networks (OSNs) like Facebook. Self-disclosure research has contributed significantly to the design of ...

research-article
Open Access
Exploring Deceptive Design Patterns in Voice Interfaces

Deceptive design patterns (sometimes called “dark patterns”) are user interface design elements that may trick, deceive, or mislead users into behaviors that often benefit the party implementing the design over the end user. Prior work has taxonomized, ...

research-article
Vision: Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate Problems

Security and privacy issues are an ever-increasing problem for software systems. To address them, software developers must anticipate the problems that their developed systems may face, using a process we call ‘threat assessment’. Unfortunately, given ...

research-article
Shoulder Surfing through the Social Lens: A Longitudinal Investigation & Insights from an Exploratory Diary Study

Shoulder surfing is a prevailing threat when accessing information on personal devices like smartphones. Adequate mitigation requires studying shoulder surfing occurrences in people’s daily lives. In this paper, we confirm and extend previous research ...

SESSION: Privacy
research-article
Public Access
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home

Studies of privacy perception in the Internet of Things (IoT) include in-laboratory evaluations as well as investigations of purchase decisions, deployment, and long-term use. In this study, we implemented identical IoT configurations in eight ...

research-article
Vision: Usable Privacy for XR in the Era of the Metaverse

Extended Reality (XR) — an umbrella term for Augmented Reality (AR), Virtual Reality (VR) and Mixed Reality (MR) — has penetrated the consumer market and is prone to increasingly impact our lives in the near future. Various devices, e.g., MR glasses, AR ...

research-article
Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration

Health data is considered to be sensitive and personal; both governments and software platforms have enacted specific measures to protect it. Consumer apps that collect health data are becoming more popular, but raise new privacy concerns as they ...

SESSION: Societal Issues
research-article
Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors

We face certificate validation errors commonly, yet the related tools and documentation had been shown to have very poor usability. Previous research suggests that just improving the error messages and corresponding documentation can have significantly ...

research-article
Open Access
Vision: Too Little too Late? Do the Risks of FemTech already Outweigh the Benefits?

Abstract: Female-oriented technologies (FemTech) promise to enable women to take control of their bodies and lives, helping them overcome the many existing challenges in medical care and research. From lack of data about women in general, to bias and ...

research-article
Open Access
Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption

Business disruption from cyber-attacks is a recognized and growing concern, yet the uptake of cyber insurance has been substantially lower than expected. This study aimed to identify what factors may be influencing perceptions and uptake of cyber ...

research-article
Phishing with Malicious QR Codes

The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world. That changed overnight, as the QR codes became a convenient go-between for sharing URLs, including malicious ones. This opens an attractive new way of phishing as ...

SESSION: Studies of Specific Systems
research-article
Open Access
“It’s Just a Lot of Prerequisites”: A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator

Two-factor authentication (2FA) overcomes the insecurity of passwords by adding a second factor to the authentication process. A variant of 2FA, which is even phishing-resistant unlike, e.g., SMS-based implementations, is offered by the FIDO2 protocol. ...

research-article
Meaningful Context, a Red Flag, or Both? Preferences for Enhanced Misinformation Warnings Among US Twitter Users

Warning users about misinformation on social media is not a simple usability task. Soft moderation has to balance between debunking falsehoods and avoiding moderation bias while preserving the social media consumption flow. Platforms thus employ ...

research-article
Open Access
Caring About IoT-Security – An Interview Study in the Healthcare Sector

The number of medical IoT devices is increasing rapidly: CT scanners, ECG devices, insulin pumps and other devices, which previously operated independently, are being interconnected with other devices, now sharing patient data and/or uploading them to ...

research-article
Investigating the Effectiveness of Personalized Content in the Form of Videos When Promoting a TOR Browser

Due to increasing trend of data collection by websites, the use of privacy-enhancing technologies is becoming more and more important in our digital age. However, widespread adoption of tools that provide strongest protection, such as a TOR browser, has ...

Index terms have been assigned to the content through auto-classification.

Recommendations