Sponsored by Ethyca
The following posters will be presented during the In-Person Poster Session on Monday, August 8, 2022, from 5:30 pm–6:45 pm.
Posters and their abstracts are available for download below to registered attendees now and to everyone beginning Monday, August 8, 2022. Copyright to the individual works is retained by the author[s].
Posters of unpublished research.
WiP: Where’s Eve? Evaluating Student Threat Modeling Performance and Perceptions
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery
SenseHandle: Investigating Human-Door Interaction Behaviour for Authentication in the Physical World
Characterizing Misuse and Snooping in Home IoT Devices
Privacy and Security Challenges in Doctoral Students' Research
Understanding the how and the why: Exploring secure development practices through a course competition
Out of Their Control: Investigating Privacy Attitudes and Behaviors Among Tinder Users
Do authentication websites adopt friendly password registration error message design?
A Comparison of Account-Focused and Content-Focused Warnings on User Trust of Twitter Content
PhishED: Automated contextual feedback for reported Phishing
Crumbl: An awareness enhancing tool for cookie collection
Developing a Psychometric Scale to Measure One’s Valuation of Other People’s Privacy
“An incident may have resulted in a suspected data compromise”: Impact of Data Breach Notification Terminology
A Platform for Uncovering Indian Users' Decision-Making Process in United Payment Interface (UPI) Apps
Cybersecurity Comic: An Image Change to "Cool Cybersecurity" Findings and Challenges to Raise Children’s Security Awareness
Jennifer Friedauer, Ruhr-University Bochum; Harunobu Yagi, Central Japan Railway Company; Nissy Sombatruang, National Institute of Information and Communications Technology; Youki Kadobayashi, Nara Institute of Science and Technology; Daisuke Miyamoto, The University of Tokyo; Akira Fujita, National Institute of Information and Communications Technology
"If I could do this, I feel anyone could:" The Design and Evaluation of a Two-Factor Authentication Manager
The Recipe for the Perfect Batch: Assessing New Cookie Category Terms
Do Users Want To Use Digital Identities? A Study Of A Concept Of An Identity Wallet
"Others Have the Right to Know": Determinants of Willingness to Share COVID-19-Related Health Symptoms
Kirsten Chapman, Melanie Klimes, Braden Wellman, Garrett Smith, and Madeline Bonham, Brigham Young University; Yunan Chen, University of California Irvine; Staci Smith, Brigham Young University; Mainack Mondal, Indian Institute of Technology, Kharagpur; Xinru Page, Brigham Young University
"You have to be hyperaware": PhD Students’ Approaches to Boundary Management When Sharing Research-Related Information on Social Media
Posters of usable security papers published recently at other venues.
A first look into users’ perceptions of facial recognition in the physical world
“Money makes the world go around”: Identifying Barriers to Better Privacy in Children’s Apps From Developers’ Perspectives
"Now I'm a bit angry:" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them
12 Angry Developers – A Qualitative Study on Developers’ Struggles with CSP
Investigating Car Drivers’ Information Demand after Safety and Security Critical Incidents
“Taking out the Trash”: Why Security Behavior Change requires Intentional Forgetting
Identifying Password Reuse from Gaze and Keystroke Dynamics
Yasmeen Abdrabou, University of the Bundeswehr Munich and University of Glasgow; Johannes Schütte, University of the Bundeswehr Munich; Ahmed Shams, Fatura LLC; Ken Pfeuffer, Aarhus University and University of the Bundeswehr Munich; Daniel Buschek, University of Bayreuth; Mohamed Khamis, University of Glasgow; Florian Alt, University of the Bundeswehr Munich
Caring about Sharing: User Perceptions of Multiparty Data Sharing
Exploring User-Centered Security Design for Usable Authentication Ceremonies
PriView -- Exploring Visualisations to Support Users’ Privacy Awareness
Protection or Punishment? Relating the Design Space of Parental Control Apps and Perceptions about Them to Support Parenting for Online Safety
User-Perceived Privacy in Blockchain
Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users
Consumer Perspective on Loss of Support for Smart Home Devices
Owning and Sharing: Privacy Perceptions of Smart Speaker Users
How Usable Are iOS App Privacy Labels?
Understanding Shoulder Surfer Behavior and Attack Patterns Using Virtual Reality
Yasmeen Abdrabou, University of the Bundeswehr Munich and University of Glasgow; Radiah Rivu, University of the Bundeswehr Munich; Tarek Ammar, LMU Munich; Jonathan Liebers, Alia Saad, Carina Liebers, and Uwe Grünefeld, University of Duisburg-Essen; Pascan Knierim, University of the Bundeswehr Munich; Mohamed Khamis, University of Glasgow; Ville Mäkelä, University of Waterloo; Stefan Schneegass, University of Duisburg Essen; Florian Alt, University of the Bundeswehr Munich
Defining Privacy: How Users Interpret Technical Terms in Privacy Policies
Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents
Christine Utz, CISPA Helmholtz Center for Information Security; Steffen Becker, Ruhr University Bochum and Max Planck Institute for Security and Privacy; Theodor Schnitzler, Florian M. Farke, Franziska Herbert, Leonie Schaewitz, and Martin Degeling, Ruhr University Bochum; Markus Dürmuth, Leibniz University Hannover