Abstract is missing.
- Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience SamplingStéphane Ciolino, Simon Parkin, Paul Dunphy. [doi]
- A Usability Study of Five Two-Factor Authentication MethodsKen Reese, Trevor-Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, Kent E. Seamons. [doi]
- A Self-Report Measure of End-User Security Attitudes (SA-6)Cori Faklaris, Laura A. Dabbish, Jason I. Hong. [doi]
- Privacy and Security Threat Models and Mitigation Strategies of Older AdultsAlisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, Serge Egelman. [doi]
- "I was told to buy a software or lose my computer. I ignored it": A study of ransomwareCamelia Simoiu, Joseph Bonneau, Christopher Gates 0002, Sharad Goel. [doi]
- Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen DevicesLukas Mecke, Daniel Buschek, Mathias Kiermeier, Sarah Prange, Florian Alt. [doi]
- I don't own the data": End User Perceptions of Smart Home Device Data Practices and RisksMadiha Tabassum, Tomasz Kosinski, Heather Richter Lipford. [doi]
- System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall InterfacesArtem Voronkov, Leonardo A. Martucci, Stefan Lindskog. [doi]
- Cooperative Privacy and Security: Learning from People with Visual Impairments and Their AlliesJordan Hayes, Smirity Kaushik, Charlotte Emily Price, Yang Wang 0005. [doi]
- "We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer RisksAbraham H. Mhaidli, Yixin Zou, Florian Schaub. [doi]
- Why people (don't) use password managers effectivelyShikun Zhang, Sarah Pearman, Lujo Bauer, Nicolas Christin. [doi]
- "Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in SignalJustin Wu, Cyrus Gattrell, Devon Howard, Jake Tyler, Elham Vaziripour, Daniel Zappala, Kent E. Seamons. [doi]
- Certified Phishing: Taking a Look at Public Key Certificates of Phishing WebsitesUlrike Meyer, Vincent Drury. [doi]
- Usability Smells: An Analysis of Developers' Struggle With Crypto LibrariesNikhil Patnaik, Joseph Hallett, Awais Rashid. [doi]
- The Fog of Warnings: How Non-essential Notifications Blur with Security WarningsAnthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson. [doi]
- Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple MachinesFrank Li, Lisa Rogers, Arunesh Mathur, Nathan Malkin, Marshini Chetty. [doi]
- A Typology of Perceived Triggers for End-User Security and Privacy BehaviorsSauvik Das, Laura A. Dabbish, Jason I. Hong. [doi]
- Personal Information Leakage by Abusing the GDPR 'Right of Access'Mariano Di Martino, Pieter Robyns, Winnie Weyts, Peter Quax, Wim Lamotte, Ken Andries. [doi]
- More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal AssistantsNoura Abdi, Kopo M. Ramokapane, Jose M. Such. [doi]
- Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile DevicesLukas Mecke, Sarah Delgado Rodriguez, Daniel Buschek, Sarah Prange, Florian Alt. [doi]
- Evaluating Users' Perceptions about a System's Privacy: Differentiating Social and Institutional AspectsOshrat Ayalon, Eran Toch. [doi]
- "There is nothing that I need to keep secret": Sharing Practices and Concerns of Wearable Fitness DataAbdulmajeed Alqhatani, Heather Richter Lipford. [doi]
- From Usability to Secure Computing and Back AgainLucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia. [doi]
- An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 WebsitesHana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, Florian Schaub. [doi]
- Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record LinkageHye-Chung Kum, Eric D. Ragan, Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, Cason Schmit. [doi]
- Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and AdviceKaroline Busse, Julia Schäfer, Matthew Smith 0001. [doi]
- The Effect of Entertainment Media on Mental Models of Computer SecurityKelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Yasmin Abdi, Richard Roberts, Michelle L. Mazurek. [doi]