default search action
EuroUSEC 2022: Karlsruhe, Germany
- EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29 - 30, 2022. ACM 2022, ISBN 978-1-4503-9700-1
- Maryam Mehrnezhad, Christodoula Makarouna, Dante Gray:
Risks of Mobile Ambient Sensors and User Awareness, Concerns, and Preferences. 1-13 - Maria Lamond, Karen Renaud, Lara Wood, Suzanne Prior:
SOK: Young Children's Cybersecurity Knowledge, Skills & Practice: A Systematic Literature Review. 14-27 - Ashutosh Kumar Singh, Nisarg Upadhyaya, Arka Seth, Xuehui Hu, Nishanth Sastry, Mainack Mondal:
What Cookie Consent Notices Do Users Prefer: A Study In The Wild. 28-39 - Fiona Westin, Kalpana Hundlani, Sonia Chiasson:
"I just want to play games with friends and it asked me for all of my information": Trading privacy for connection during the COVID-19 pandemic. 40-52 - Nicolás E. Díaz Ferreyra, Sina Ostendorf, Esma Aïmeur, Maritta Heisel, Matthias Brand:
ENAGRAM: An App to Evaluate Preventative Nudges for Instagram. 53-63 - Kentrell Owens, Johanna Gunawan, David R. Choffnes, Pardis Emami Naeini, Tadayoshi Kohno, Franziska Roesner:
Exploring Deceptive Design Patterns in Voice Interfaces. 64-78 - Cecilia Loureiro-Koechlin, José-Rodrigo Córdoba-Pachón, Lynne M. Coventry, Soteris Demetriou, Charles Weir:
Vision: Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate Problems. 79-84 - Habiba Farzand, Karola Marky, Mohamed Khamis:
Shoulder Surfing through the Social Lens: A Longitudinal Investigation & Insights from an Exploratory Diary Study. 85-97 - Jacob Abbott, Jayati Dev, DongInn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana R. Ringenberg, Vafa Andalibi, L. Jean Camp:
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home. 98-110 - Chris Warin, Delphine Reinhardt:
Vision: Usable Privacy for XR in the Era of the Metaverse. 111-116 - Mohammad Tahaei, Julia Bernd, Awais Rashid:
Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration. 117-130 - Martin Ukrop, Michaela Balázová, Pavol Zácik, Eric Vincent Valcík, Vashek Matyas:
Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors. 131-144 - Maryam Mehrnezhad, Laura Shipp, Teresa Almeida, Ehsan Toreini:
Vision: Too Little too Late? Do the Risks of FemTech already Outweigh the Benefits? 145-150 - Dawn Branley-Bell, Lynne M. Coventry, Pam Briggs:
Cyber Insurance from the stakeholder's perspective: A qualitative analysis of barriers and facilitators to adoption: A qualitative analysis of barriers and facilitators to adoption. 151-159 - Markus Keil, Philipp Markert, Markus Dürmuth:
"It's Just a Lot of Prerequisites": A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator. 172-188 - Marco Gutfleisch, Markus Schöps, Jonas Hielscher, Mary Cheney, Sibel Sayin, Nathalie Schuhmacher, Ali Mohamad, M. Angela Sasse:
Caring About IoT-Security - An Interview Study in the Healthcare Sector. 202-215 - Yusuf Albayram, David Suess, Yassir Yaghzar Elidrissi:
Investigating the Effectiveness of Personalized Content in the Form of Videos When Promoting a TOR Browser. 216-232
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.