11.
|
On Smartphone Users’ Difficulty with Understanding Implicit Authentication
/ Masoud Mehrabi Koushki ; Borke Obada-Obieh ; Jun Ho Huh ; Konstantin Beznosov
[LERSSE-RefConfPaper-2021-003]
Implicit authentication (IA) has recently become a popular approach for providing physical security on smartphones. [...]
Published in Masoud Mehrabi Koushki, Borke Obada-Obieh, Jun Ho Huh, Konstantin Beznosov. On Smartphone Users’ Difficulty with Understanding Implicit Authentication. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'21), 2021.:
Fulltext: PDF;
|
12.
|
The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets
/ Artemij Voskobojnikov ; Oliver Wiese ; Masoud Mehrabi Koushki ; Volker Roth ; et al
[LERSSE-RefConfPaper-2021-002]
In a corpus of 45,821 app reviews of the top five mobile cryptocurrency wallets, we identified and qualitatively analyzed 6,859 reviews pertaining to the user experience (UX) with those wallets. [...]
Published in Artemij Voskobojnikov, Oliver Wiese, Masoud Mehrabi Koushki, Volker Roth, Konstantin Beznosov. The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'21), 2021.:
Fulltext: PDF;
|
13.
|
Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users
/ Svetlana Abramova ; Artemij Voskobojnikov ; Konstantin Beznosov ; Rainer Böhme
[LERSSE-RefConfPaper-2021-001]
Crypto-assets are unique in tying financial wealth to the secrecy of private keys. [...]
Published in Svetlana Abramova, Artemij Voskobojnikov, Konstantin Beznosov, Rainer Böhme. Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'21), 2021.:
Fulltext: PDF;
|
14.
|
Is Implicit Authentication on Smartphones Really Popular? On Android Users’ Perception of “Smart Lock for Android”
/ Masoud Mehrabi Koushki ; Borke Obada-Obieh ; Jun Ho Huh ; Konstantin Beznosov
[LERSSE-RefConfPaper-2020-005]
Implicit authentication (IA) on smartphones has gained a lot of attention from the research community over the past decade. [...]
Published in Masoud Mehrabi Koushki, Borke Obada-Obieh, Jun Ho Huh, Konstantin Beznosov. Is Implicit Authentication on Smartphones Really Popular? On Android Users’ Perception of “Smart Lock for Android”. In the Proceedings of Twenty-Second International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2020), Virtual Conference, 2020.:
Fulltext: PDF;
|
15.
|
Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault
/ Borke Obada-Obieh ; Lucrezia Spagnolo ; Konstantin Beznosov
[LERSSE-RefConfPaper-2020-004]
According to the United States Department of Justice, every 73 seconds, an American is sexually assaulted. [...]
Published in Borke Obada-Obieh, Lucrezia Spagnolo, and Konstantin Beznosov. "Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault." In Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS), 2020.:
Fulltext: PDF;
|
16.
|
Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users
/ Artemij Voskobojnikov ; Borke Obada-Obieh ; Yue Huang ; Konstantin Beznosov
[LERSSE-RefConfPaper-2020-003]
With the massive growth of cryptocurrency markets in recent years has come an influx of new users and investors, pushing the overall number of owners into the millions. [...]
Published in Artemij Voskobojnikov, Borke Obada-Obieh, Yue Huang, Konstantin Beznosov. Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users. In the Proceedings of Twenty-Fourth International Conference on Financial Cryptography and Data Security (FC'20), Kota Kinabalu, 2020:
Fulltext: PDF;
|
17.
|
The Burden of Ending Online Account Sharing
/ Borke Obada-Obieh ; Yue Huang ; Konstantin Beznosov
[LERSSE-RefConfPaper-2020-002]
Many people share online accounts, even in situations where high privacy and security are expected. [...]
Published in Borke Obada-Obieh, Yue Huang, Konstantin Beznosov. The Burden of Ending Online Account Sharing. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'20), 2020.:
Fulltext: PDF;
|
18.
|
Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks
/ Yue Huang ; Borke Obada-Obieh ; Konstantin Beznosov
[LERSSE-RefConfPaper-2020-001]
With the rapid adoption of smart speakers in people’s homes, there is a corresponding increase in users’ privacy and security concerns. [...]
Published in Yue Huang, Borke Obada-Obieh, Konstantin Beznosov. Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'20), 2020, pages 402:1-13.:
Fulltext: PDF;
|
19.
|
Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones
/ Diogo Marques ; Tiago Guerreiro ; Luís Carriço ; Ivan Beschastnikh ; et al
[LERSSE-RefConfPaper-2019-002]
Unauthorized physical access to personal devices by people known to the owner of the device is a common concern, and a common occurrence. [...]
Published in In Proceedings of CHI 2019, Glasgow, UK:
Fulltext: PDF PDF (PDFA);
|
20.
|
Towards Understanding the Link Between Age and Smartphone Authentication
/ Lina Qiu ; Alexander De Luca ; Ildar Muslukhov ; Konstantin Beznosov
[LERSSE-RefConfPaper-2019-001]
While previous work on smartphone (un)locking has revealed real world usage patterns, several aspects still need to be explored. [...]
Published in In Proceedings of CHI 2019, Glasgow, UK:
Fulltext: PDF PDF (PDFA);
|