


default search action
EuroUSEC 2023: Copenhagen, Denmark
- Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023. ACM 2023
- Maryam Mehrnezhad
, Teresa Almeida
:
"My sex-related data is more sensitive than my financial data and I want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies. 1-14 - Kazma Chaudhry
, Anna-Lena Theus
, Hala Assal
, Sonia Chiasson
:
"It's not that I want to see the student's bedroom...": Instructor Perceptions of e-Proctoring Software. 15-26 - Ehsan Ul Haque
, Mohammad Maifi Hasan Khan
, Md Abdullah Al Fahim
, Theodore Jensen
:
Divergences in Blame Attribution after a Security Breach based on Compliance Behavior: Implications for Post-breach Risk Communication. 27-47 - Khadija Baig
, Daniela Napoli
, Sonia Chiasson
:
A comparison of users' and non-users' perceptions of health and ancestry at-home DNA testing. 48-67 - Ehsan Ul Haque
, Mohammad Maifi Hasan Khan
:
Effect of Device Risk Perceptions and Understandability of Data Management Features on Consumers' Willingness to Pay (WTP) for IoT Device Premium Data Management Plan. 68-85 - Matt Dixon
, Elizabeth Sillence
, James Nicholson
, Lynne M. Coventry
:
Better the Devil You Know: Using Lost-Smartphone Scenarios to Explore user Perceptions of Unauthorised Access. 86-96 - Matt Dixon
, Elizabeth Sillence
, James Nicholson
, Lynne M. Coventry
:
"It's the one thing that makes my life tick": Security Perspectives of the Smartphone Era. 97-111 - Kerstin Bongard-Blanchy
, Jean-Louis Sterckx
, Arianna Rossi
, Anastasia Sergeeva
, Vincent Koenig
, Salvador Rivas
, Verena Distler
:
Analysing the Influence of Loss-Gain Framing on Data Disclosure Behaviour: A Study on the Use Case of App Permission Requests. 112-125 - Artur Geers
, Aaron Yi Ding
, Carlos Hernandez Gañán
, Simon Parkin
:
Lessons in Prevention and Cure: A User Study of Recovery from Flubot Smartphone Malware. 126-142 - Urvashi Kishnani
, Naheem Noah
, Sanchari Das
, Rinku Dewri
:
Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications. 143-157 - Daniel V. Bailey
, Collins W. Munyendo
, Hunter A. Dyer
, Miles Grant
, Philipp Markert
, Adam J. Aviv
:
"Someone Definitely Used 0000": Strategies. 158-174 - Markus Röse
, Emiram Kablo
, Patricia Arias Cabarcos
:
Overcoming Theory: Designing Brainwave Authentication for the Real World. 175-191 - Mei Suzuki
, Ryo Iijima
, Kazuki Nomoto
, Tetsushi Ohki
, Tatsuya Mori
:
PinchKey: A Natural and User-Friendly Approach to VR User Authentication. 192-204 - Karen Li
, Awais Rashid
, Anne Roudaut
:
Usable Security Model for Industrial Control Systems - Authentication and Authorisation Workflow. 205-217 - Daiki Ishii
, Akira Kanaoka
:
Vision: How to Provide Documentation to Non-skilled Developers for Appropriate Use of Cryptography: Action Research Study on Expert Monitoring. 218-223 - Fabian Lucas Ballreich
, Melanie Volkamer
, Dirk Müllmann
, Benjamin Maximilian Berens
, Elena Marie Häußler
, Karen Vera Renaud
:
Encouraging Organisational Information Security Incident Reporting. 224-236 - Uta Menges
, Jonas Hielscher
, Laura Kocksch
, Annette Kluge
, M. Angela Sasse
:
Caring Not Scaring - An Evaluation of a Workshop to Train Apprentices as Security Champions. 237-252 - Shirin Shams
, Delphine Reinhardt
:
Vision: Supporting Citizens in Adopting Privacy Enhancing Technologies. 253-259 - Marco Gutfleisch
, Markus Schöps
, Stefan Albert Horstmann
, Daniel Wichmann
, M. Angela Sasse
:
Security Champions Without Support: Results from a Case Study with OWASP SAMM in a Large-Scale E-Commerce Enterprise. 260-276 - George Chalhoub
, Andrew Martin
:
But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers. 277-295 - Anna Leschanowsky
, Birgit Popp
, Nils Peters
:
Privacy Strategies for Conversational AI and their Influence on Users' Perceptions and Decision-Making. 296-311 - Anne Hennig
, Nhu Thi Thanh Vuong
, Peter Mayer
:
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked. 312-317 - Mattia Mossano
, Oksana Kulyk
, Benjamin Maximilian Berens
, Elena Marie Häußler
, Melanie Volkamer
:
Influence of URL Formatting on Users' Phishing URL Detection. 318-333 - Sarah Ying Zheng
, Ingolf Becker
:
Phishing to improve detection. 334-343 - Neeranjan Chitare
, Lynne M. Coventry
, James Nicholson
:
"It may take ages": Understanding Human-Centred Lateral Phishing Attack Detection in Organisations. 344-355

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.