Rethinking connection security indicators

AP Felt, RW Reeder, A Ainslie, H Harris… - Twelfth Symposium on …, 2016 - usenix.org
We propose a new set of browser security indicators, based on user research and an
understanding of the design challenges faced by browsers. To motivate the need for new …

Beyond LED status lights-design requirements of privacy notices for body-worn cameras

M Koelle, K Wolf, S Boll - … of the Twelfth International Conference on …, 2018 - dl.acm.org
Privacy notices aim to make users aware of personal data gathered and processed by a
system. Body-worn cameras currently lack suitable design strategies for privacy notices that …

On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security

C Stransky, D Wermke, J Schrader, N Huaman… - … Symposium on Usable …, 2021 - usenix.org
Communication tools with end-to-end (E2E) encryption help users maintain their privacy.
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …

Towards leveraging behavioral economics in mobile application design

T Stockinger, M Koelle, P Lindemann, M Kranz… - … in education and …, 2015 - Springer
People do not always think and behave rationally. Behavioral economics has produced
theories to explain when and why people make such allegedly irrational decisions, for …

Only play in your comfort zone: interaction methods for improving security awareness on mobile devices

P Riedl, R Mayrhofer, A Möller, M Kranz… - Personal and Ubiquitous …, 2015 - Springer
In this paper, we study the concept of security zones as an intermediate layer of
compartmentalization on mobile devices. Each of these security zones is isolated against …

Augmenting MetaMask to support TLS-endorsed smart contracts

U Gallersdörfer, J Ebel, F Matthes - International Workshop on Data …, 2021 - Springer
Users in blockchain systems are exposed to address replacement attacks due to the weak
binding between websites and smart contracts, as they have no way to verify the authenticity …

Security in migratory interactive web applications

G Ghiani, F Paternò, L Isoni - … of the 11th International Conference on …, 2012 - dl.acm.org
In ubiquitous environments migratory interactive applications allow users to perform their
tasks continuously across various devices. Users can push and pull migratory Web …

[PDF][PDF] A literature survey of security indicators in web browsers

L Jelovčan, SLR Vrhovec, A Mihelič - Elektrotehniski Vestnik, 2020 - ev.fe.uni-lj.si
The web browser security indicators are one of the main tools helping users to identify
fraudulent (eg, phishing) websites. The research in detection of phishing websites focuses …

" Who decides?" security and privacy in the wild

K Radke, C Boyd, JG Nieto, L Buys - Proceedings of the 25th Australian …, 2013 - dl.acm.org
Even though web security protocols are designed to make computer communication secure,
it is widely known that there is potential for security breakdowns at the human-machine …

[图书][B] Designing Socially Acceptable Body-worn Cameras

M Koelle - 2020 - marionkoelle.de
Body-worn cameras, the focus of this thesis, promise a range of benefits, such as object
recognition, tracking and visual navigation, but also personal expression and memory …