3,174 Hits in 5.3 sec

Measuring user confidence in smartphone security and privacy

Erika Chin, Adrienne Porter Felt, Vyas Sekar, David Wagner
2012 Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS '12  
This understanding will help inform the design of more secure smartphones that will enable users to safely and confidently benefit from the potential and convenience offered by mobile platforms.  ...  What are users' comfort levels in performing different tasks? How do users select applications? What are their overall perceptions of the platform?  ...  Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/2335356.2335358 dblp:conf/soups/ChinFSW12 fatcat:bpla6sp3dfaddoh5ewffgjmrqy

A Study on Evaluation for Improving the Usability of Mobile Web User Interface
모바일 웹 사용자 인터페이스의 사용성 향상을 위한 평가에 관한 연구

Hee Wan Kim
2016 Journal of Service Research and Studies  
Then, it is presented an evaluation criteria of Mobile Web UI/UX for improving the usability of the mobile device.  ...  In this paper, it is discussed how to minimize the inconvenience of use while improving the convenience of the UI / UX that make up the mobile web.  ...  Hybrid App Hybrid app has the advantage of mobile web that can flexibly respond to changes in benefits and services, content and access to service in mobile apps.  ... 
doi:10.18807/jsrs.2016.6.2.185 fatcat:z4n32kl6bnhi3lsmb2nfhjrkhu

On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security

Christian Stransky, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, Sascha Fahl
2021 Symposium On Usable Privacy and Security  
We then studied the effect of making E2E encryption more visible in a messaging app.  ...  of the overall trustworthiness, security, and privacy of E2E-encrypted messaging.  ...  Our work tests these promising results in the space of mobile messaging apps.  ... 
dblp:conf/soups/StranskyWSHAFWU21 fatcat:665k7wbm2rborarjj6clyba5fa

Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy

Kopo M. Ramokapane, Anthony C. Mazeli, Awais Rashid
2019 Proceedings on Privacy Enhancing Technologies  
To bridge this gap, we conducted a task-based study with 27 Android and iOS smart-phone users in order to learn about their perceptions, concerns and practices, and to understand the usability of these  ...  ., default location services, iCloud, Google Assistant, ad tracking) enhance the usability and extend the functionality of these devices.  ...  Acknowledgements We thank the anonymous reviewers for their suggestions and feedback. This work is partly supported by EPSRC Grants EP/P031838/1 and EP/N023234/1.  ... 
doi:10.2478/popets-2019-0027 dblp:journals/popets/RamokapaneMR19 fatcat:bihgekne3rhxdkabmx4uoaax6a

"If You Can't Beat them, Join them"

Hamza Harkous, Karl Aberer
2017 Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY '17  
To our knowledge, our work is the first to provide quantifiable evidence of the privacy risk that collaborators pose in cloud apps.  ...  Next, we realize this concept by introducing a new privacy indicator, which can be integrated within the cloud apps' authorization interface.  ...  The research leading to these results has received funding from the EU in the context of the project CloudSpaces: Open Service Platform for the Next Generation of Personal clouds (FP7-317555).  ... 
doi:10.1145/3029806.3029837 dblp:conf/codaspy/HarkousA17 fatcat:srtgbpssojb4rlqunq4gozin6u

A Pilot Study of an Inspection Framework for Automated Usability Guideline Reviews of Mobile Health Applications

Jing Xu, Xiang Ding, Ke Huang, Guanling Chen
2014 Proceedings of the Wireless Health 2014 on National Institutes of Health - WH '14  
In the mobile domain, applications face more challenges to deliver good experiences to end users due to the characteristics and usage of mobile devices in ubiquitous computing contexts.  ...  We hope this framework can be used to enforce a minimum bar for the usability of mobile health applications and further adapted when new products in the field are developed.  ...  Any opinions, findings, and conclusions or recommendations expressed in this work are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/2668883.2669585 dblp:conf/wh/XuDHC14 fatcat:47prb3kr5rhslfylhtcn24ru5m

Targeted Advertising on the Handset: Privacy and Security Challenges [chapter]

Hamed Haddadi, Pan Hui, Tristan Henderson, Ian Brown
2011 Pervasive Advertising  
A key benefit of using mobile phones is to take advantage of the significant amount of information on phones -such as locations of interest to the user -in order to provide personalised advertisements.  ...  In the final section of this chapter we describe some of the security mechanisms used in detecting click-through fraud, and techniques that can be used to ensure that the extra privacy protections of MobiAd  ...  This is not an issue in general for desktops, but on a mobile phone numerous HTTP connections could slow down the browsing experience.  ... 
doi:10.1007/978-0-85729-352-7_6 dblp:series/hci/HaddadiHHB11 fatcat:65pjhgm2gjgpfnqhs2aquzedqu

Improving mobile internet usability

George Buchanan, Sarah Farrant, Matt Jones, Harold Thimbleby, Gary Marsden, Michael Pazzani
2001 Proceedings of the tenth international conference on World Wide Web - WWW '01  
Evaluation and theoretical analysis of usability combined with innovative design can achieve significant improvements in user performance and satisfaction.  ...  Although much progress has been made in terms of technological innovation, many of mobile internet systems are difficult to use, lack flexibility and robustness. They give a poor user experience.  ...  Along with several other groups, we moved the focus of our work to wider usability issues of web-like browsing on small screens.  ... 
doi:10.1145/371920.372181 dblp:conf/www/BuchananFJTMP01 fatcat:j4bdnhsxhrg7ta3lstmwrxftga

When it's better to ask forgiveness than get permission

Christopher Thompson, Maritza Johnson, Serge Egelman, David Wagner, Jennifer King
2013 Proceedings of the Ninth Symposium on Usable Privacy and Security - SOUPS '13  
Smartphone applications pose interesting security problems because the same resources they use to enhance the user experience may also be used in ways that users might find objectionable.  ...  First, we performed an online survey and found that, as attribution mechanisms have become available on the Android platform, users notice and use them.  ...  This work was supported by the Intel Science and Technology Center for Secure Computing and the Air Force Office of Scientific Research (Grant #29182280-51677-C).  ... 
doi:10.1145/2501604.2501605 dblp:conf/soups/ThompsonJEWK13 fatcat:36kswemfv5bsng3rtzmnobflpa

Goldilocks and thetwomobile devices

Eiji Hayashi, Oriana Riva, Karin Strauss, A. J. Bernheim Brush, Stuart Schechter
2012 Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS '12  
also aware of security and reliability limitations.  ...  Fourteen participants out of 20 preferred these controls to existing security locks alone.  ...  on their tablet, such as watching movies or browsing the web.  ... 
doi:10.1145/2335356.2335359 dblp:conf/soups/HayashiRSBS12 fatcat:67bk4ktskbco3hzxgdam5bzury

Reciprocity attacks

Feng Zhu, Sandra Carpenter, Ajinkya Kulkarni, Swapna Kolimi
2011 Proceedings of the Seventh Symposium on Usable Privacy and Security - SOUPS '11  
To the best of our knowledge, this is the first attempt to understand the impact of the norm of reciprocity as an attack in mobile and pervasive computing environments.  ...  We implemented software to provide a rich shopping experience in a mobile and pervasive computing environment and embedded the reciprocity attack.  ...  The band consists of Bono (vocals and guitar), The Edge (guitar, keyboards, and vocals), Adam Clayton (bass guitar) and Larry Mullen, Jr. (drums and percussion).  ... 
doi:10.1145/2078827.2078839 dblp:conf/soups/ZhuCKK11 fatcat:wn32bfo5wjalbfjlbgtzzrgjze

Usability Attributes for Mobile Applications: A Systematic Review [chapter]

Ryan Alturki, Valerie Gay
2019 Lecture Notes in Computer Science  
The usability of mobile applications (apps) is an emerging area of research because of the increasing use of mobile devices around the world.  ...  Based on this research, comprehensive guidelines for mobile apps' usability can then be provided.  ...  attractiveness. 2013 Security The paper discusses the relationship between security and usability in mobile platforms; and how reducing various security threats can improve the usability of mobile apps  ... 
doi:10.1007/978-3-319-99966-1_5 fatcat:4g3m76wfg5h7pmstucktzcomcm

"My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security

Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, Sara B. Kiesler
2015 Symposium On Usable Privacy and Security  
People with more articulated technical models perceived more privacy threats, possibly driven by their more accurate understanding of where specific risks could occur in the network.  ...  Consistent with other work on user knowledge and experience, our study suggests a greater emphasis on policies and systems that protect privacy and security without relying too much on users' security  ...  ACKNOWLEDGEMENTS We thank Katherine Mashek and Zachery Mullins for their help conducting interviews, and we thank Sauvik Das, members of the CoEX lab, David Naylor, Peter Steenkiste and other members of  ... 
dblp:conf/soups/KangDFK15 fatcat:77irzhzvmnghfba34ejnetoywa

The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings

Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson
2019 Symposium On Usable Privacy and Security  
Generalization has important implications for the domains of usable security and human-computer interaction.  ...  Further, with the increasing number of notifications in our lives across a range of mobile, Internet of Things, and computing devices, the accumulated effect of generalization may be substantial.  ...  ACKNOWLEDGMENTS This was supported by the National Science Foundation under Grant CNS-1931108.  ... 
dblp:conf/soups/VanceEJKA19 fatcat:vxu4lww23feejc37srfmcacvme

Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations

Salvatore Manfredi, Mariano Ceccato, Giada Sciarretta, Silvio Ranise
2022 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
These tools are mainly evaluated in terms of their accuracy in detecting vulnerabilities, but the evaluation of their usability is commonly neglected.  ...  Usability of automated security tools is particularly crucial when dealing with problems of cryptographic protocols for which even small-apparently insignificant-changes in configuration can result in  ...  We would also like to thank Matteo Rizzi for his work on NGINX-related mitigations.  ... 
doi:10.22667/jowua.2022.03.31.056 dblp:journals/jowua/ManfrediCSR22 fatcat:2wkcj4qubzecjmcvofkos422qu
« Previous Showing results 1 — 15 out of 3,174 results