Human factors in security research: Lessons learned from 2008-2018
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …
into account the human factor by studying regular users and, to a lesser extent, experts like …
[PDF][PDF] Privacy threats in intimate relationships
K Levy, B Schneier - Journal of Cybersecurity, 2020 - academic.oup.com
This article provides an overview of intimate threats: a class of privacy threats that can arise
within our families, romantic partnerships, close friendships, and caregiving relationships …
within our families, romantic partnerships, close friendships, and caregiving relationships …
A Deep Dive into User's Preferences and Behavior around Mobile Phone Sharing
Users share their personal devices with different entities in various circumstances. While
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …
{Anti-Privacy} and {Anti-Security} Advice on {TikTok}: Case Studies of {Technology-Enabled} Surveillance and Control in Intimate Partner and {Parent-Child} …
Modern technologies including smartphones, AirTags, and tracking apps enable
surveillance and control in interpersonal relationships. In this work, we study videos posted …
surveillance and control in interpersonal relationships. In this work, we study videos posted …
The security & privacy acceptance framework (spaf)
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
SoK: Social Cybersecurity
We analyze prior work in social cybersecurity and present a structuring of this literature
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …
The Sociotechnical Stack: Opportunities for Social Computing Research in Non-consensual Intimate Media
Non-consensual intimate media (NCIM) involves sharing intimate content without the
depicted person's consent, including'revenge porn'and sexually explicit deepfakes. While …
depicted person's consent, including'revenge porn'and sexually explicit deepfakes. While …
Usable sexurity: Studying {People's} concerns and strategies when sexting
Sexting, while becoming commonplace in the age of mobile phones, is still not well-studied
outside of the context of youth or risk prevention. Taking the perspective that sexting is a …
outside of the context of youth or risk prevention. Taking the perspective that sexting is a …
" We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together
H Watson, E Moju-Igbene, A Kumari… - Proceedings of the 2020 …, 2020 - dl.acm.org
Digital resources are often collectively owned and shared by small social groups (eg, friends
sharing Netflix accounts, roommates sharing game consoles, families sharing WhatsApp …
sharing Netflix accounts, roommates sharing game consoles, families sharing WhatsApp …
[PDF][PDF] Cross-Contextual Examination of Older Adults' Privacy Concerns, Behaviors, and Vulnerabilities
ABSTRACT A growing body of research has examined the privacy concerns and behaviors
of older adults, often within specific contexts. It remains unclear to what extent older adults' …
of older adults, often within specific contexts. It remains unclear to what extent older adults' …