The following posters will be presented at the Poster Session on Monday, August 9, 2:00 pm–2:45 pm PDT.
Posters and their abstracts are available for download below to registered attendees now and to everyone beginning Monday, August 9, 2021. Copyright to the individual works is retained by the author[s].
Posters of unpublished research.
Leech: Let's Expose Evidently bad data Collecting Habits – Towards a Serious Game on Understanding Privacy Policies
Mobile Security Strategies and Usability Problems in IPV and Stalking Contexts
Better Passwords through Prospect Theory
Prioritizing Minimalistic Design: The Negative Impact on Users' Control over Privacy in Facebook’s Ad Preferences
Exploring Government Security Awareness Programs: A Mixed-Methods Approach
Investigating Usable Indicators against Cyber-Attacks in Industrial Control Systems
Potential Reuse of University Credentials
The Study of Cybersecurity Self-Efficacy: A Systematic Literature Review of Methodology
Comparing Scam Emails and Email User Education at Universities
"I'll throw in a courtesy like": A poster about features, etiquette, and user privacy
"Assertive driver, I can imagine that": Interpretations of Inferences from Driving Data
Upside Down Facebook: Raising Awareness of Behavioral Advertising Through Artistic Provocation
Replication: Application of Security Attitudes Scale to Japanese Workers
"I could become a meme": Security & Privacy Concerns of Students and Educators While Working from Home
A Cross-role Analysis on Security Efforts and Constraints of Software Development Projects
Posters of usable security papers published recently at other venues.
Prioritizing Security over Usability: Strategies for How People Choose Passwords
To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem
Poli-see: An Interactive Tool for Visualizing Privacy Policies
GDPR Reality Check – Claiming and Investigating Personally Identifiable Data from Companies
SoK: Three Facets of Privacy Policies
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra
Cybercrime in Small and Medium-sized Enterprises
Nicolas Huaman, CISPA & Leibniz University Hannover; Alexander Krause, Leibniz University Hannover; Bennet von Skarczinski, PwC Germany; Christian Stransky, Leibniz University Hannover; Dominik Wermke, CISPA & Leibniz University Hannover; Yasemin Acar, Max Planck Institute for Security and Privacy; Arne Dreißigacker, Criminological Research Institute of Lower Saxony; Sascha Fahl, CISPA & Leibniz University Hannover
Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining
When Googling it doesn't work: the challenge of finding security advice for smart home devices
They Would do Better if They Worked Together The Case of Interaction Problems Between Password Managers and Websites
Nicolas Huaman and Sabrina Amft, CISPA Helmholtz Center for Information Security, Leibniz University Hannover; Marten Oltrogge, CISPA Helmholtz Center for Information Security; Yasemin Acar, Max Planck Institute for Security and Privacy; Sascha Fahl, CISPA Helmholtz Center for Information Security, Leibniz University Hannover