scholarly journals Game theoretical analysis of usable security and privacy

2018 ◽  
pp. e55
Author(s):  
Cynara Justine ◽  
Rendhir R. Prasad ◽  
Ciza Thomas
Author(s):  
Carolyn Brodie ◽  
Clare-Marie Karat ◽  
John Karat ◽  
Jinjuan Feng

i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 189-195
Author(s):  
Florian Alt ◽  
Emanuel von Zezschwitz

AbstractNew technologies are constantly becoming part of our everyday life. At the same time, designers and developers still often do not consider the implications of their design choices on security and privacy. For example, new technologies generate sensitive data, enable access to sensitive data, or can be used in malicious ways. This creates a need to fundamentally rethink the way in which we design new technologies. While some of the related opportunities and challenges have been recognized and are being addressed by the community, there is still a need for a more holistic understanding. In this editorial, we will address this by (1) providing a brief historical overview on the research field of ‘Usable Security and Privacy’; (2) deriving a number of current and future trends; and (3) briefly introducing the articles that are part of this special issue and describing how they relate to the current trends and what researchers and practitioners can learn from them.


2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Zhen Ling ◽  
Melanie Borgeest ◽  
Chuta Sano ◽  
Jazmyn Fuller ◽  
Anthony Cuomo ◽  
...  

To protect users from numerous password inference attacks, we invent a novel context aware privacy enhancing keyboard (PEK) for Android touch-based devices. Usually PEK would show a QWERTY keyboard when users input text like an email or a message. Nevertheless, whenever users enter a password in the input box on his or her touch-enabled device, a keyboard will be shown to them with the positions of the characters shuffled at random. PEK has been released on the Google Play since 2014. However, the number of installations has not lived up to our expectation. For the purpose of usable security and privacy, we designed a two-stage usability test and performed two rounds of iterative usability testing in 2016 and 2017 summer with continuous improvements of PEK. The observations from the usability testing are educational: (1) convenience plays a critical role when users select an input method; (2) people think those attacks that PEK prevents are remote from them.


Sign in / Sign up

Export Citation Format

Share Document