All Stories

  1. A US-UK Usability Evaluation of Consent Management Platform Cookie Consent Interface Design on Desktop and Mobile
  2. Identifying User Needs for Advertising Controls on Facebook
  3. A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research
  4. Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts
  5. “You Gotta Watch What You Say”: Surveillance of Communication with Incarcerated People
  6. HCI Ethics, Privacy, Accessibility, and the Environment: A Town Hall Forum on Global Policy Issues
  7. "It's a scavenger hunt": Usability of Websites' Opt-Out and Data Deletion Choices
  8. Informing the Design of a Personalized Privacy Assistant for the Internet of Things
  9. Exploring How Privacy and Security Factor into IoT Device Purchase Behavior
  10. The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios
  11. Nudges for Privacy and Security
  12. Exploring Topic-Based Sharing Mechanisms
  13. Design and Evaluation of a Data-Driven Password Meter
  14. A Large-Scale Evaluation of U.S. Financial Institutions’ Standardized Privacy Notices
  15. Do Users' Perceptions of Password Security Match Reality?
  16. I Would Like To..., I Shouldn't..., I Wish I...
  17. Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
  18. Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords
  19. Better Together: Usability and Security Go Hand in Hand
  20. General Requirements of a Hybrid-Modeling Framework for Cyber Security
  21. Improving App Privacy: Nudging App Developers to Protect User Privacy
  22. A field trial of privacy nudges for facebook
  23. Can long passwords be secure and usable?
  24. Electronic privacy and surveillance
  25. The Privacy and Security Behaviors of Smartphone App Developers
  26. Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy
  27. The post anachronism
  28. Privacy Engineering Emerges as a Hot New Career
  29. Privacy manipulation and acclimation in a location sharing application
  30. "i read my Twitter the next morning and was astonished"
  31. Privacy as part of the app decision-making process
  32. A Shortage of Privacy Engineers
  33. "Little brothers watching you"
  34. Measuring password guessability for an entire university
  35. QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks
  36. The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs
  37. The post that wasn't
  38. What matters to users?
  39. Your attention please
  40. Out of sight, out of mind: Effects of displaying access-control information near the item it controls
  41. Tag, you can see it!
  42. Why Johnny can't opt out
  43. Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms
  44. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
  45. Can Users Control Online Behavioral Advertising Effectively?
  46. A Conundrum of Permissions: Installing Applications on an Android Smartphone
  47. Correct horse battery staple
  48. Operating system framed in case of mistaken identity
  49. Smart, useful, scary, creepy
  50. Studying access-control usability in the lab
  51. What do online behavioral advertising privacy disclosures communicate to users?
  52. {Privacy, privacidad, Приватност} policies in social media
  53. CANTINA+
  54. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study
  55. Exploring reactive access control
  56. More than skin deep
  57. Of passwords and people
  58. When are users comfortable sharing locations with advertisers?
  59. Usability of Forensics Tools: A User Study
  60. Bridging the Gap in Computer Security Warnings: A Mental Model Approach
  61. "I regretted the minute I pressed share"
  62. Adapt-a-ride
  63. An Investigation into Facebook Friend Grouping
  64. Are you close with me? are you nearby?
  65. I know where you live
  66. Improving Computer Security Dialogs
  67. Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites
  68. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
  69. Empirical models of privacy in location sharing
  70. CS expertise for institutional review boards
  71. Institutional review boards and your research
  72. Teaching Johnny not to fall for phish
  73. Access control for home data sharing
  74. Americans' attitudes about internet behavioral advertising practices
  75. Are your participants gaming the system?
  76. Encountering stronger password requirements
  77. Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects
  78. Locaccino
  79. Standardizing privacy notices
  80. Token attempt
  81. Who falls for phish?
  82. Improving phishing countermeasures: An analysis of expert interviews
  83. Real life challenges in access-control management
  84. Timing is everything?
  85. Who's viewed you?
  86. A "nutrition label" for privacy
  87. A Comparative Study of Online Privacy Policies and Formats
  88. A user study of the expandable grid applied to P3P privacy policy visualization
  89. Analyzing use of privacy policy attributes in a location sharing application
  90. Engineering Privacy
  91. School of phish
  92. The impact of privacy indicators on search engine browsing patterns
  93. Who's viewed you?
  94. A Survey to Guide Group Key Protocol Development
  95. Understanding and capturing people’s privacy policies in a mobile social networking application
  96. Lessons from a real world evaluation of anti-phishing training
  97. P3P deployment on websites
  98. A user study of policy creation in a flexible access-control system
  99. Expandable grids for visualizing and authoring computer security policies
  100. You've been warned
  101. A user study of the expandable grid applied to P3P privacy policy visualization
  102. User-controllable learning of security and privacy policies
  103. Forum
  104. Protecting people from phishing
  105. User-Controllable Security and Privacy for Pervasive Computing
  106. Anti-Phishing Phil
  107. Behavioral response to phishing risk
  108. Cantina
  109. Getting users to pay attention to anti-phishing education
  110. Lessons learned from the deployment of a smartphone-based access-control system
  111. User interfaces for privacy agents
  112. What do they "indicate?"
  113. An analysis of P3P-enabled web sites among top-20 search results
  114. Decision strategies and susceptibility to phishing
  115. Human selection of mnemonic phrase-based passwords
  116. Power strips, prophylactics, and privacy, oh my!
  117. Privacy in India: Attitudes and Awareness
  118. Privacy patterns for online interactions
  119. Vicarious infringement creates a privacy ceiling
  120. Giving notice: why privacy policies and security breach notifications aren't enough
  121. Peripheral privacy notifications for wireless networks
  122. Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine
  123. Guest Editors' Introduction: Secure or Usable?
  124. An analysis of security vulnerabilities in the movie production and distribution process
  125. I Didn’t buy It for Myself
  126. P3P: making privacy policies more useful
  127. Analysis of security vulnerabilities in the movie production and distribution process
  128. Automated analysis of P3P-enabled Web sites
  129. In Search of the Perfect Voting Technology: No Easy Answers
  130. Letter from the Special Section Editor
  131. The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences
  132. Use of a P3P user agent by early adopters
  133. The architecture of robust publishing systems
  134. Internet voting for public officials: introduction
  135. Voting after Florida
  136. Influencing software usage
  137. Internet privacy
  138. Privacy critics
  139. Privacy in e-commerce
  140. Putting it together
  141. Laws, self-relf-regulation, and P3P: will W3C's privacy platform help make the Web safe for privacy?
  142. Research posters 101