A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
An unexpectedly large count of trees in the West African Sahara and Sahel
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …
A survey on adaptive authentication
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …
authenticating a user depending on contextual factors, such as location, proximity to …
Moving from a 'human-as-problem” to a 'human-as-solution” cybersecurity mindset
V Zimmermann, K Renaud - International Journal of Human-Computer …, 2019 - Elsevier
Cybersecurity has gained prominence, with a number of widely publicised security incidents,
hacking attacks and data breaches reaching the news over the last few years. The …
hacking attacks and data breaches reaching the news over the last few years. The …
The evolution of HCI and human factors: Integrating human and artificial intelligence
M Chignell, L Wang, A Zare, J Li - ACM Transactions on Computer …, 2023 - dl.acm.org
We review HCI history from both the perspective of its 1980s split with human factors and its
nature as a discipline. We then revisit human augmentation as an alternative to user …
nature as a discipline. We then revisit human augmentation as an alternative to user …
The nudge puzzle: matching nudge interventions to cybersecurity decisions
V Zimmermann, K Renaud - ACM Transactions on Computer-Human …, 2021 - dl.acm.org
Nudging is a promising approach, in terms of influencing people to make advisable choices
in a range of domains, including cybersecurity. However, the processes underlying the …
in a range of domains, including cybersecurity. However, the processes underlying the …
Why do developers get password storage wrong? A qualitative usability study
A Naiakshina, A Danilova, C Tiefenau… - Proceedings of the …, 2017 - dl.acm.org
Passwords are still a mainstay of various security systems, as well as the cause of many
usability issues. For end-users, many of these issues have been studied extensively …
usability issues. For end-users, many of these issues have been studied extensively …
Beyond credential stuffing: Password similarity models using neural networks
Attackers increasingly use passwords leaked from one website to compromise associated
accounts on other websites. Such targeted attacks work because users reuse, or pick …
accounts on other websites. Such targeted attacks work because users reuse, or pick …
The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes
V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
On the accuracy of password strength meters
Password strength meters are an important tool to help users choose secure passwords.
Strength meters can only then provide reasonable guidance when they are accurate, ie …
Strength meters can only then provide reasonable guidance when they are accurate, ie …