[HTML][HTML] User, usage and usability: Redefining human centric cyber security

M Grobler, R Gaire, S Nepal - Frontiers in big Data, 2021 - frontiersin.org
The effectiveness of cyber security measures are often questioned in the wake of hard hitting
security events. Despite much work being done in the field of cyber security, most of the …

Why older adults (Don't) use password managers

H Ray, F Wolf, R Kuber, AJ Aviv - 30th USENIX Security Symposium …, 2021 - usenix.org
Password managers (PMs) are considered highly effective tools for increasing security, and
a recent study by Pearman et al.(SOUPS'19) highlighted the motivations and barriers to …

They would do better if they worked together: The case of interaction problems between password managers and websites

N Huaman, S Amft, M Oltrogge… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Password managers are tools to support users with the secure generation and storage of
credentials and logins used in online accounts. Previous work illustrated that building …

" I'm Literally Just Hoping This Will {Work:'}'Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities

D Napoli, K Baig, S Maqsood, S Chiasson - Seventeenth Symposium on …, 2021 - usenix.org
To successfully manage security and privacy threats, users must be able to perceive the
relevant information. However, a number of accessibility obstacles impede the access of …

Systematization of password manageruse cases and design paradigms

J Simmons, O Diallo, S Oesch, S Ruoti - Proceedings of the 37th Annual …, 2021 - dl.acm.org
Despite efforts to replace them, passwords remain the primary form of authentication on the
web. Password managers seek to address many of the problems with passwords by helping …

Understanding dynamics of initial trust and its antecedents in password managers adoption intention among young adults

A Farooq, A Dubinina, S Virtanen, J Isoaho - Procedia Computer Science, 2021 - Elsevier
Security professionals often suggest password managers as one of the best measures for
the end-users. However, the end-users have shown reluctance in adopting them, mostly due …

On smartphone users' difficulty with understanding implicit authentication

MM Koushki, B Obada-Obieh, JH Huh… - Proceedings of the 2021 …, 2021 - dl.acm.org
Implicit authentication (IA) has recently become a popular approach for providing physical
security on smartphones. It relies on behavioral traits (eg, gait patterns) for user …

Real-time behavioral biometric information security system for assessment fraud detection

A Subash, I Song - 2021 IEEE international conference on …, 2021 - ieeexplore.ieee.org
Online education has become a major delivery method in education. Many schools have
adopted online delivery of courses. This has exposed schools to greater information security …

Two-factor password-authenticated key exchange with end-to-end security

S Jarecki, M Jubur, H Krawczyk, N Saxena… - ACM Transactions on …, 2021 - dl.acm.org
We present a secure two-factor authentication (TFA) scheme based on the user's
possession of a password and a crypto-capable device. Security is “end-to-end” in the sense …

An Analysis of Modern Password Manager Security and Usage on Desktop and Mobile Devices

T Oesch - 2021 - trace.tennessee.edu
Security experts recommend password managers to help users generate, store, and enter
strong, unique passwords. Prior research confirms that managers do help users move …