A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

An unexpectedly large count of trees in the West African Sahara and Sahel

M Brandt, CJ Tucker, A Kariryaa, K Rasmussen, C Abel… - Nature, 2020 - nature.com
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …

A survey on adaptive authentication

P Arias-Cabarcos, C Krupitzer, C Becker - ACM Computing Surveys …, 2019 - dl.acm.org
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …

Moving from a 'human-as-problem” to a 'human-as-solution” cybersecurity mindset

V Zimmermann, K Renaud - International Journal of Human-Computer …, 2019 - Elsevier
Cybersecurity has gained prominence, with a number of widely publicised security incidents,
hacking attacks and data breaches reaching the news over the last few years. The …

The evolution of HCI and human factors: Integrating human and artificial intelligence

M Chignell, L Wang, A Zare, J Li - ACM Transactions on Computer …, 2023 - dl.acm.org
We review HCI history from both the perspective of its 1980s split with human factors and its
nature as a discipline. We then revisit human augmentation as an alternative to user …

The nudge puzzle: matching nudge interventions to cybersecurity decisions

V Zimmermann, K Renaud - ACM Transactions on Computer-Human …, 2021 - dl.acm.org
Nudging is a promising approach, in terms of influencing people to make advisable choices
in a range of domains, including cybersecurity. However, the processes underlying the …

Why do developers get password storage wrong? A qualitative usability study

A Naiakshina, A Danilova, C Tiefenau… - Proceedings of the …, 2017 - dl.acm.org
Passwords are still a mainstay of various security systems, as well as the cause of many
usability issues. For end-users, many of these issues have been studied extensively …

Beyond credential stuffing: Password similarity models using neural networks

B Pal, T Daniel, R Chatterjee… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Attackers increasingly use passwords leaked from one website to compromise associated
accounts on other websites. Such targeted attacks work because users reuse, or pick …

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …

On the accuracy of password strength meters

M Golla, M Dürmuth - Proceedings of the 2018 ACM SIGSAC conference …, 2018 - dl.acm.org
Password strength meters are an important tool to help users choose secure passwords.
Strength meters can only then provide reasonable guidance when they are accurate, ie …