Human factors in security research: Lessons learned from 2008-2018

M Kaur, M van Eeten, M Janssen, K Borgolte… - arXiv preprint arXiv …, 2021 - arxiv.org
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …

[PDF][PDF] Privacy threats in intimate relationships

K Levy, B Schneier - Journal of Cybersecurity, 2020 - academic.oup.com
This article provides an overview of intimate threats: a class of privacy threats that can arise
within our families, romantic partnerships, close friendships, and caregiving relationships …

A Deep Dive into User's Preferences and Behavior around Mobile Phone Sharing

R Paudel, P Dumaru, A Shrestha, H Kocabas… - Proceedings of the …, 2023 - dl.acm.org
Users share their personal devices with different entities in various circumstances. While
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …

{Anti-Privacy} and {Anti-Security} Advice on {TikTok}: Case Studies of {Technology-Enabled} Surveillance and Control in Intimate Partner and {Parent-Child} …

M Wei, E Zeng, T Kohno, F Roesner - Eighteenth Symposium on Usable …, 2022 - usenix.org
Modern technologies including smartphones, AirTags, and tracking apps enable
surveillance and control in interpersonal relationships. In this work, we study videos posted …

The security & privacy acceptance framework (spaf)

S Das, C Faklaris, JI Hong… - Foundations and Trends …, 2022 - nowpublishers.com
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …

SoK: Social Cybersecurity

Y Wu, WK Edwards, S Das - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
We analyze prior work in social cybersecurity and present a structuring of this literature
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …

The Sociotechnical Stack: Opportunities for Social Computing Research in Non-consensual Intimate Media

L Qiwei, A McDonald, OL Haimson… - Proceedings of the …, 2024 - dl.acm.org
Non-consensual intimate media (NCIM) involves sharing intimate content without the
depicted person's consent, including'revenge porn'and sexually explicit deepfakes. While …

Usable sexurity: Studying {People's} concerns and strategies when sexting

C Geeng, J Hutson, F Roesner - … on Usable Privacy and Security (SOUPS …, 2020 - usenix.org
Sexting, while becoming commonplace in the age of mobile phones, is still not well-studied
outside of the context of youth or risk prevention. Taking the perspective that sexting is a …

" We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together

H Watson, E Moju-Igbene, A Kumari… - Proceedings of the 2020 …, 2020 - dl.acm.org
Digital resources are often collectively owned and shared by small social groups (eg, friends
sharing Netflix accounts, roommates sharing game consoles, families sharing WhatsApp …

[PDF][PDF] Cross-Contextual Examination of Older Adults' Privacy Concerns, Behaviors, and Vulnerabilities

Y Zou, K Sun, T Afnan, R Abu-Salma… - Privacy-Enhancing …, 2024 - kclpure.kcl.ac.uk
ABSTRACT A growing body of research has examined the privacy concerns and behaviors
of older adults, often within specific contexts. It remains unclear to what extent older adults' …