" I need a better description": An Investigation Into User Expectations For Differential Privacy
Despite recent widespread deployment of differential privacy, relatively little is known about
what users think of differential privacy. In this work, we seek to explore users' privacy …
what users think of differential privacy. In this work, we seek to explore users' privacy …
" It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online
We investigate how a population of end-users with especially salient security and privacy
risks---sex workers---conceptualizes and manages their digital safety. The commercial sex …
risks---sex workers---conceptualizes and manages their digital safety. The commercial sex …
" If HTTPS Were Secure, I Wouldn't Need 2FA"-End User and Administrator Mental Models of HTTPS
K Krombholz, K Busse, K Pfeffer… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
HTTPS is one of the most important protocols used to secure communication and is,
fortunately, becoming more pervasive. However, especially the long tail of websites is still …
fortunately, becoming more pervasive. However, especially the long tail of websites is still …
“… I have my dad, sister, brother, and mom's password”: unveiling users' mental models of security and privacy-preserving tools
Purpose The purpose of this study is to understand user perceptions and misconceptions
regarding security tools. Security and privacy-preserving tools (for brevity, the authors term …
regarding security tools. Security and privacy-preserving tools (for brevity, the authors term …
" Did They {F*** ing} Consent to That?": Safer Digital Intimacy via Proactive Protection Against {Image-Based} Sexual Abuse
L Qin, V Hamilton, S Wang, Y Aydinalp… - 33rd USENIX Security …, 2024 - usenix.org
As many as 8 in 10 adults share intimate content such as nude or lewd images. Sharing
such content has significant benefits for relationship intimacy and body image, and can offer …
such content has significant benefits for relationship intimacy and body image, and can offer …
Security-visible, yet unseen?
An unsolved debate in the field of usable security concerns whether security mechanisms
should be visible, or blackboxed away from the user for the sake of usability. However, tying …
should be visible, or blackboxed away from the user for the sake of usability. However, tying …
" Would you give the same priority to the bank and a game? I do {not!}" exploring credential management strategies and obstacles during password manager setup
Password managers allow users to improve password security by handling large numbers of
strong and unique passwords without the burden of memorizing them. While users are …
strong and unique passwords without the burden of memorizing them. While users are …
Security at the End of the Tunnel: The Anatomy of {VPN} Mental Models Among Experts and {Non-Experts} in a Corporate Context
With the worldwide COVID-19 pandemic in 2020 and 2021 necessitating working from
home, corporate Virtual Private Networks (VPNs) have become an important item securing …
home, corporate Virtual Private Networks (VPNs) have become an important item securing …
27 years and 81 million opportunities later: Investigating the use of Email encryption for an entire university
Email is one of the main communication tools and has seen significant adoption in the past
decades. However, emails are sent in plain text by default and allow attackers easy access …
decades. However, emails are sent in plain text by default and allow attackers easy access …
On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security
Communication tools with end-to-end (E2E) encryption help users maintain their privacy.
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …