default search action
EuroUSEC 2024: Karlstad, Sweden
- Farzaneh Karegar, Ali Farooq:
Proceedings of the 2024 European Symposium on Usable Security, EuroUSEC 2024, KarlstadSweden, 30 September 2024- 1 October 2024. ACM 2024, ISBN 979-8-4007-1796-3 - Lorin Schöni, Victor Carles, Martin Strohmeier, Peter Mayer, Verena Zimmermann:
You Know What? - Evaluation of a Personalised Phishing Training Based on Users' Phishing Knowledge and Detection Skills. 1-14 - Sijie Zhuo, Robert Biddle, Jared Daniel Recomendable, Giovanni Russello, Danielle M. Lottridge:
Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing Detection. 15-29 - Pavlo Burda, Luca Allodi, Alexander Serebrenik, Nicola Zannone:
'Protect and Fight Back': A Case Study on User Motivations to Report Phishing Emails. 30-43 - Anne-Kee Doing, Eduardo Barbaro, Frank van der Roest, Pieter van Gelder, Yury Zhauniarovich, Simon Parkin:
An analysis of phishing reporting activity in a bank. 44-57 - Yamane El-Zein, Kavous Salehzadeh Niksirat, Noé Zufferey, Mathias Humbert, Kévin Huguenin:
Shadow Health-Related Data: Definition, Categorization, and User Perspectives. 58-76 - Lydia Weinberger, Christian Eichenmüller, Freya Gassmann, Gaston Pugliese, Zinaida Benenson:
Used, Avoided, Restricted? Perceptions, Behavior, and Changes in Video Conferencing of German-speaking Users During and After the Pandemic. 77-93 - Ann-Kristin Lieberknecht:
Exploring Determinants of Parental Engagement in Online Privacy Protection: A Qualitative Approach. 94-111 - Hussein Hazazi, Mohamed Shehab:
Exploring End Users' Perceptions of Smart Lock Automation Within the Smart Home Environment. 112-124 - Victoria Kunde, Jan Magnus Nold, Jonas Hielscher:
"Everything We Encrypt Today Could Be Cracked" - Exploring (Post) Quantum Cryptography Misconceptions. 125-136 - Stefanos Evripidou, Jeremy Daniel McKendrick Watson:
Understanding Operational Technology Personnel's Mindsets and Their Effect on Cybersecurity Perceptions: A Qualitative Study With Operational Technology Cybersecurity Practitioners. 137-154 - Anamika Rajendran, Tarun Kumar Yadav, Malek Al-Jbour, Francisco Manuel Mares Solano, Kent E. Seamons, Joshua Reynolds:
Deniable Encrypted Messaging: User Understanding after Hands-on Social Experience. 155-171 - Alvi Jawad, Hala Assal, Jason Jaskolka:
"I'm Getting Information that I Can Act on Now": Exploring the Level of Actionable Information in Tool-generated Threat Reports. 172-186 - Julia Wunder, Janik Aurich, Zinaida Benenson:
From Chaos to Consistency: The Role of CSAF in Streamlining Security Advisories. 187-199 - Karen Li, Kopo M. Ramokapane, Awais Rashid:
Usability Study of Security Features in Programmable Logic Controllers. 200-219 - Elena Korkes, Collins W. Munyendo, Alvin Isaac, Victoria Hennemann, Adam J. Aviv:
"I'm going to try her birthday": Investigating How Friends Guess Each Other's Smartphone Unlock PINs in the Lab. 220-234 - Eman Alashwali, Ragashree Mysuru Chandrashekar, Mandy Lanyon, Lorrie Faith Cranor:
Detection and Impact of Debit/Credit Card Fraud: Victims' Experiences. 235-260 - Chen Ling, Gianluca Stringhini:
"It was jerks on the Internet being jerks on the Internet": Understanding Zoombombing Through the Eyes of Its Victims. 261-276 - Kieron Ivy Turk, Alice Hutchings:
Stop Following Me! Evaluating the Malicious Uses of Personal Item Tracking Devices and Their Anti-Stalking Features. 277-289 - Emre Kocyigit, Arianna Rossi, Gabriele Lenzini:
A Systematic Approach for A Reliable Detection of Deceptive Design Patterns Through Measurable HCI Features. 290-308 - Yonas Leguesse, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
A Metric to Assess the Reliability of Crowd-sourced SUS Scores: A Case Study on the PoPLar Authentication Tool. 309-321 - Temima Hrle, Mary Milad, Jingjie Li, Daniel W. Woods:
"Just a tool, until you stab someone with it": Exploring Reddit Users' Questions and Advice on the Legality of Port Scans. 322-336 - Suvadeep Mukherjee, Verena Distler, Gabriele Lenzini, Pedro Cardoso-Leite:
Balancing The Perception of Cheating Detection, Privacy and Fairness: A Mixed-Methods Study of Visual Data Obfuscation in Remote Proctoring. 337-353
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.