


default search action
EuroUSEC 2023: Copenhagen, Denmark
- Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023. ACM 2023

- Maryam Mehrnezhad

, Teresa Almeida
:
"My sex-related data is more sensitive than my financial data and I want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies. 1-14 - Kazma Chaudhry

, Anna-Lena Theus
, Hala Assal
, Sonia Chiasson
:
"It's not that I want to see the student's bedroom...": Instructor Perceptions of e-Proctoring Software. 15-26 - Ehsan Ul Haque

, Mohammad Maifi Hasan Khan
, Md Abdullah Al Fahim
, Theodore Jensen
:
Divergences in Blame Attribution after a Security Breach based on Compliance Behavior: Implications for Post-breach Risk Communication. 27-47 - Khadija Baig

, Daniela Napoli
, Sonia Chiasson
:
A comparison of users' and non-users' perceptions of health and ancestry at-home DNA testing. 48-67 - Ehsan Ul Haque

, Mohammad Maifi Hasan Khan
:
Effect of Device Risk Perceptions and Understandability of Data Management Features on Consumers' Willingness to Pay (WTP) for IoT Device Premium Data Management Plan. 68-85 - Matt Dixon

, Elizabeth Sillence
, James Nicholson
, Lynne M. Coventry
:
Better the Devil You Know: Using Lost-Smartphone Scenarios to Explore user Perceptions of Unauthorised Access. 86-96 - Matt Dixon

, Elizabeth Sillence
, James Nicholson
, Lynne M. Coventry
:
"It's the one thing that makes my life tick": Security Perspectives of the Smartphone Era. 97-111 - Kerstin Bongard-Blanchy

, Jean-Louis Sterckx
, Arianna Rossi
, Anastasia Sergeeva
, Vincent Koenig
, Salvador Rivas
, Verena Distler
:
Analysing the Influence of Loss-Gain Framing on Data Disclosure Behaviour: A Study on the Use Case of App Permission Requests. 112-125 - Artur Geers

, Aaron Yi Ding
, Carlos Hernandez Gañán
, Simon Parkin
:
Lessons in Prevention and Cure: A User Study of Recovery from Flubot Smartphone Malware. 126-142 - Urvashi Kishnani

, Naheem Noah
, Sanchari Das
, Rinku Dewri
:
Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications. 143-157 - Daniel V. Bailey

, Collins W. Munyendo
, Hunter A. Dyer
, Miles Grant
, Philipp Markert
, Adam J. Aviv
:
"Someone Definitely Used 0000": Strategies. 158-174 - Markus Röse

, Emiram Kablo
, Patricia Arias Cabarcos
:
Overcoming Theory: Designing Brainwave Authentication for the Real World. 175-191 - Mei Suzuki

, Ryo Iijima
, Kazuki Nomoto
, Tetsushi Ohki
, Tatsuya Mori
:
PinchKey: A Natural and User-Friendly Approach to VR User Authentication. 192-204 - Karen Li

, Awais Rashid
, Anne Roudaut
:
Usable Security Model for Industrial Control Systems - Authentication and Authorisation Workflow. 205-217 - Daiki Ishii

, Akira Kanaoka
:
Vision: How to Provide Documentation to Non-skilled Developers for Appropriate Use of Cryptography: Action Research Study on Expert Monitoring. 218-223 - Fabian Lucas Ballreich

, Melanie Volkamer
, Dirk Müllmann
, Benjamin Maximilian Berens
, Elena Marie Häußler
, Karen Vera Renaud
:
Encouraging Organisational Information Security Incident Reporting. 224-236 - Uta Menges

, Jonas Hielscher
, Laura Kocksch
, Annette Kluge
, M. Angela Sasse
:
Caring Not Scaring - An Evaluation of a Workshop to Train Apprentices as Security Champions. 237-252 - Shirin Shams

, Delphine Reinhardt
:
Vision: Supporting Citizens in Adopting Privacy Enhancing Technologies. 253-259 - Marco Gutfleisch

, Markus Schöps
, Stefan Albert Horstmann
, Daniel Wichmann
, M. Angela Sasse
:
Security Champions Without Support: Results from a Case Study with OWASP SAMM in a Large-Scale E-Commerce Enterprise. 260-276 - George Chalhoub

, Andrew Martin
:
But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers. 277-295 - Anna Leschanowsky

, Birgit Popp
, Nils Peters
:
Privacy Strategies for Conversational AI and their Influence on Users' Perceptions and Decision-Making. 296-311 - Anne Hennig

, Nhu Thi Thanh Vuong
, Peter Mayer
:
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked. 312-317 - Mattia Mossano

, Oksana Kulyk
, Benjamin Maximilian Berens
, Elena Marie Häußler
, Melanie Volkamer
:
Influence of URL Formatting on Users' Phishing URL Detection. 318-333 - Sarah Ying Zheng

, Ingolf Becker
:
Phishing to improve detection. 334-343 - Neeranjan Chitare

, Lynne M. Coventry
, James Nicholson
:
"It may take ages": Understanding Human-Centred Lateral Phishing Attack Detection in Organisations. 344-355

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














