Rethinking connection security indicators
We propose a new set of browser security indicators, based on user research and an
understanding of the design challenges faced by browsers. To motivate the need for new …
understanding of the design challenges faced by browsers. To motivate the need for new …
Beyond LED status lights-design requirements of privacy notices for body-worn cameras
Privacy notices aim to make users aware of personal data gathered and processed by a
system. Body-worn cameras currently lack suitable design strategies for privacy notices that …
system. Body-worn cameras currently lack suitable design strategies for privacy notices that …
On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security
Communication tools with end-to-end (E2E) encryption help users maintain their privacy.
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …
Towards leveraging behavioral economics in mobile application design
People do not always think and behave rationally. Behavioral economics has produced
theories to explain when and why people make such allegedly irrational decisions, for …
theories to explain when and why people make such allegedly irrational decisions, for …
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices
In this paper, we study the concept of security zones as an intermediate layer of
compartmentalization on mobile devices. Each of these security zones is isolated against …
compartmentalization on mobile devices. Each of these security zones is isolated against …
Augmenting MetaMask to support TLS-endorsed smart contracts
U Gallersdörfer, J Ebel, F Matthes - International Workshop on Data …, 2021 - Springer
Users in blockchain systems are exposed to address replacement attacks due to the weak
binding between websites and smart contracts, as they have no way to verify the authenticity …
binding between websites and smart contracts, as they have no way to verify the authenticity …
Security in migratory interactive web applications
In ubiquitous environments migratory interactive applications allow users to perform their
tasks continuously across various devices. Users can push and pull migratory Web …
tasks continuously across various devices. Users can push and pull migratory Web …
[PDF][PDF] A literature survey of security indicators in web browsers
L Jelovčan, SLR Vrhovec, A Mihelič - Elektrotehniski Vestnik, 2020 - ev.fe.uni-lj.si
The web browser security indicators are one of the main tools helping users to identify
fraudulent (eg, phishing) websites. The research in detection of phishing websites focuses …
fraudulent (eg, phishing) websites. The research in detection of phishing websites focuses …
" Who decides?" security and privacy in the wild
Even though web security protocols are designed to make computer communication secure,
it is widely known that there is potential for security breakdowns at the human-machine …
it is widely known that there is potential for security breakdowns at the human-machine …
[图书][B] Designing Socially Acceptable Body-worn Cameras
M Koelle - 2020 - marionkoelle.de
Body-worn cameras, the focus of this thesis, promise a range of benefits, such as object
recognition, tracking and visual navigation, but also personal expression and memory …
recognition, tracking and visual navigation, but also personal expression and memory …