Human factors in security research: Lessons learned from 2008-2018
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …
into account the human factor by studying regular users and, to a lesser extent, experts like …
Examining the adoption and abandonment of security, privacy, and identity theft protection practices
Users struggle to adhere to expert-recommended security and privacy practices. While prior
work has studied initial adoption of such practices, little is known about the subsequent …
work has studied initial adoption of such practices, little is known about the subsequent …
Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy Risks
Privacy is a key principle for developing ethical AI technologies, but how does including AI
technologies in products and services change privacy risks? We constructed a taxonomy of …
technologies in products and services change privacy risks? We constructed a taxonomy of …
" Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them
Despite the prevalence of data breaches, there is a limited understanding of individuals'
awareness, perception, and responses to breaches that affect them. We provide novel …
awareness, perception, and responses to breaches that affect them. We provide novel …
A {self-report} measure of {end-user} security attitudes ({{{{{SA-6}}}}})
We present SA-6, a six-item scale for assessing people's security attitudes that we
developed by following standardized processes for scale development. We identify six scale …
developed by following standardized processes for scale development. We identify six scale …
“They See You're a Girl if You Pick a Pink Robot with a Skirt”: A Qualitative Study of How Children Conceptualize Data Processing and Digital Privacy Risks
As children become frequent digital technology users, concerns about their digital privacy
are increasing. To better understand how young children conceptualize data processing and …
are increasing. To better understand how young children conceptualize data processing and …
Child safety in the smart home: parents' perceptions, needs, and mitigation strategies
Concerns about child physical and digital safety are emerging with families' adoption of
smart home technologies such as robot vacuums and smart speakers. To better understand …
smart home technologies such as robot vacuums and smart speakers. To better understand …
" If It's Important It Will Be A Headline" Cybersecurity Information Seeking in Older Adults
Older adults are increasingly vulnerable to cybersecurity attacks and scams. Yet we know
relatively little about their understanding of cybersecurity, their information-seeking …
relatively little about their understanding of cybersecurity, their information-seeking …
Individually vulnerable, collectively safe: The security and privacy practices of households with older adults
Older adults are especially vulnerable to online cybersecurity and privacy (SP) threats, such
as phishing, ransomware, and targeted misinformation campaigns. Prior work has …
as phishing, ransomware, and targeted misinformation campaigns. Prior work has …
" Did They {F*** ing} Consent to That?": Safer Digital Intimacy via Proactive Protection Against {Image-Based} Sexual Abuse
L Qin, V Hamilton, S Wang, Y Aydinalp… - 33rd USENIX Security …, 2024 - usenix.org
As many as 8 in 10 adults share intimate content such as nude or lewd images. Sharing
such content has significant benefits for relationship intimacy and body image, and can offer …
such content has significant benefits for relationship intimacy and body image, and can offer …