23 ways to nudge: A review of technology-mediated nudging in human-computer interaction

A Caraban, E Karapanos, D Gonçalves… - Proceedings of the 2019 …, 2019 - dl.acm.org
Ten years ago, Thaler and Sunstein introduced the notion of nudging to talk about how
subtle changes in the'choice architecture'can alter people's behaviors in predictable ways …

A survey on adaptive authentication

P Arias-Cabarcos, C Krupitzer, C Becker - ACM Computing Surveys …, 2019 - dl.acm.org
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …

" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab

B Ur, F Noma, J Bees, SM Segreti, R Shay… - Eleventh symposium on …, 2015 - usenix.org
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …

Honeywords: Making password-cracking detectable

A Juels, RL Rivest - Proceedings of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We propose a simple method for improving the security of hashed passwords: the
maintenance of additional``honeywords''(false passwords) associated with each user's …

A study of probabilistic password models

J Ma, W Yang, M Luo, N Li - 2014 IEEE Symposium on Security …, 2014 - ieeexplore.ieee.org
A probabilistic password model assigns a probability value to each string. Such models are
useful for research into understanding what makes users choose more (or less) secure …

Testing metrics for password creation policies by attacking large sets of revealed passwords

M Weir, S Aggarwal, M Collins, H Stern - … of the 17th ACM conference on …, 2010 - dl.acm.org
In this paper we attempt to determine the effectiveness of using entropy, as defined in NIST
SP800-63, as a measurement of the security provided by various password creation …

A field trial of privacy nudges for facebook

Y Wang, PG Leon, A Acquisti, LF Cranor… - Proceedings of the …, 2014 - dl.acm.org
Anecdotal evidence and scholarly research have shown that Internet users may regret some
of their online disclosures. To help individuals avoid such regrets, we designed two …

Let's go in for a closer look: Observing passwords in their natural habitat

S Pearman, J Thomas, PE Naeini, H Habib… - Proceedings of the …, 2017 - dl.acm.org
Text passwords---a frequent vector for account compromise, yet still ubiquitous---have been
studied for decades by researchers attempting to determine how to coerce users to create …

How does your password measure up? The effect of strength meters on password creation

B Ur, PG Kelley, S Komanduri, J Lee, M Maass… - 21st USENIX security …, 2012 - usenix.org
To help users create stronger text-based passwords, many web sites have deployed
password meters that provide visual feedback on password strength. Although these meters …

Measuring {Real-World} Accuracies and Biases in Modeling Password Guessability

B Ur, SM Segreti, L Bauer, N Christin… - 24th USENIX Security …, 2015 - usenix.org
Parameterized password guessability—how many guesses a particular cracking algorithm
with particular training data would take to guess a password—has become a common metric …