default search action
EuroUSEC 2023: Copenhagen, Denmark
- Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023. ACM 2023
- Maryam Mehrnezhad, Teresa Almeida:
"My sex-related data is more sensitive than my financial data and I want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies. 1-14 - Kazma Chaudhry, Anna-Lena Theus, Hala Assal, Sonia Chiasson:
"It's not that I want to see the student's bedroom...": Instructor Perceptions of e-Proctoring Software. 15-26 - Ehsan Ul Haque, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Theodore Jensen:
Divergences in Blame Attribution after a Security Breach based on Compliance Behavior: Implications for Post-breach Risk Communication. 27-47 - Khadija Baig, Daniela Napoli, Sonia Chiasson:
A comparison of users' and non-users' perceptions of health and ancestry at-home DNA testing. 48-67 - Ehsan Ul Haque, Mohammad Maifi Hasan Khan:
Effect of Device Risk Perceptions and Understandability of Data Management Features on Consumers' Willingness to Pay (WTP) for IoT Device Premium Data Management Plan. 68-85 - Matt Dixon, Elizabeth Sillence, James Nicholson, Lynne M. Coventry:
Better the Devil You Know: Using Lost-Smartphone Scenarios to Explore user Perceptions of Unauthorised Access. 86-96 - Matt Dixon, Elizabeth Sillence, James Nicholson, Lynne M. Coventry:
"It's the one thing that makes my life tick": Security Perspectives of the Smartphone Era. 97-111 - Kerstin Bongard-Blanchy, Jean-Louis Sterckx, Arianna Rossi, Anastasia Sergeeva, Vincent Koenig, Salvador Rivas, Verena Distler:
Analysing the Influence of Loss-Gain Framing on Data Disclosure Behaviour: A Study on the Use Case of App Permission Requests. 112-125 - Artur Geers, Aaron Yi Ding, Carlos Hernandez Gañán, Simon Parkin:
Lessons in Prevention and Cure: A User Study of Recovery from Flubot Smartphone Malware. 126-142 - Urvashi Kishnani, Naheem Noah, Sanchari Das, Rinku Dewri:
Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications. 143-157 - Daniel V. Bailey, Collins W. Munyendo, Hunter A. Dyer, Miles Grant, Philipp Markert, Adam J. Aviv:
"Someone Definitely Used 0000": Strategies. 158-174 - Markus Röse, Emiram Kablo, Patricia Arias Cabarcos:
Overcoming Theory: Designing Brainwave Authentication for the Real World. 175-191 - Mei Suzuki, Ryo Iijima, Kazuki Nomoto, Tetsushi Ohki, Tatsuya Mori:
PinchKey: A Natural and User-Friendly Approach to VR User Authentication. 192-204 - Karen Li, Awais Rashid, Anne Roudaut:
Usable Security Model for Industrial Control Systems - Authentication and Authorisation Workflow. 205-217 - Daiki Ishii, Akira Kanaoka:
Vision: How to Provide Documentation to Non-skilled Developers for Appropriate Use of Cryptography: Action Research Study on Expert Monitoring. 218-223 - Fabian Lucas Ballreich, Melanie Volkamer, Dirk Müllmann, Benjamin Maximilian Berens, Elena Marie Häußler, Karen Vera Renaud:
Encouraging Organisational Information Security Incident Reporting. 224-236 - Uta Menges, Jonas Hielscher, Laura Kocksch, Annette Kluge, M. Angela Sasse:
Caring Not Scaring - An Evaluation of a Workshop to Train Apprentices as Security Champions. 237-252 - Shirin Shams, Delphine Reinhardt:
Vision: Supporting Citizens in Adopting Privacy Enhancing Technologies. 253-259 - Marco Gutfleisch, Markus Schöps, Stefan Albert Horstmann, Daniel Wichmann, M. Angela Sasse:
Security Champions Without Support: Results from a Case Study with OWASP SAMM in a Large-Scale E-Commerce Enterprise. 260-276 - George Chalhoub, Andrew Martin:
But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers. 277-295 - Anna Leschanowsky, Birgit Popp, Nils Peters:
Privacy Strategies for Conversational AI and their Influence on Users' Perceptions and Decision-Making. 296-311 - Anne Hennig, Nhu Thi Thanh Vuong, Peter Mayer:
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked. 312-317 - Mattia Mossano, Oksana Kulyk, Benjamin Maximilian Berens, Elena Marie Häußler, Melanie Volkamer:
Influence of URL Formatting on Users' Phishing URL Detection. 318-333 - Sarah Ying Zheng, Ingolf Becker:
Phishing to improve detection. 334-343 - Neeranjan Chitare, Lynne M. Coventry, James Nicholson:
"It may take ages": Understanding Human-Centred Lateral Phishing Attack Detection in Organisations. 344-355
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.