A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Measuring user confidence in smartphone security and privacy
2012
Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS '12
This understanding will help inform the design of more secure smartphones that will enable users to safely and confidently benefit from the potential and convenience offered by mobile platforms. ...
What are users' comfort levels in performing different tasks? How do users select applications? What are their overall perceptions of the platform? ...
Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the National Science Foundation. ...
doi:10.1145/2335356.2335358
dblp:conf/soups/ChinFSW12
fatcat:bpla6sp3dfaddoh5ewffgjmrqy
A Study on Evaluation for Improving the Usability of Mobile Web User Interface
모바일 웹 사용자 인터페이스의 사용성 향상을 위한 평가에 관한 연구
2016
Journal of Service Research and Studies
모바일 웹 사용자 인터페이스의 사용성 향상을 위한 평가에 관한 연구
Then, it is presented an evaluation criteria of Mobile Web UI/UX for improving the usability of the mobile device. ...
In this paper, it is discussed how to minimize the inconvenience of use while improving the convenience of the UI / UX that make up the mobile web. ...
Hybrid App Hybrid app has the advantage of mobile web that can flexibly respond to changes in benefits and services, content and access to service in mobile apps. ...
doi:10.18807/jsrs.2016.6.2.185
fatcat:z4n32kl6bnhi3lsmb2nfhjrkhu
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security
2021
Symposium On Usable Privacy and Security
We then studied the effect of making E2E encryption more visible in a messaging app. ...
of the overall trustworthiness, security, and privacy of E2E-encrypted messaging. ...
Our work tests these promising results in the space of mobile messaging apps. ...
dblp:conf/soups/StranskyWSHAFWU21
fatcat:665k7wbm2rborarjj6clyba5fa
Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy
2019
Proceedings on Privacy Enhancing Technologies
To bridge this gap, we conducted a task-based study with 27 Android and iOS smart-phone users in order to learn about their perceptions, concerns and practices, and to understand the usability of these ...
., default location services, iCloud, Google Assistant, ad tracking) enhance the usability and extend the functionality of these devices. ...
Acknowledgements We thank the anonymous reviewers for their suggestions and feedback. This work is partly supported by EPSRC Grants EP/P031838/1 and EP/N023234/1. ...
doi:10.2478/popets-2019-0027
dblp:journals/popets/RamokapaneMR19
fatcat:bihgekne3rhxdkabmx4uoaax6a
"If You Can't Beat them, Join them"
2017
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY '17
To our knowledge, our work is the first to provide quantifiable evidence of the privacy risk that collaborators pose in cloud apps. ...
Next, we realize this concept by introducing a new privacy indicator, which can be integrated within the cloud apps' authorization interface. ...
The research leading to these results has received funding from the EU in the context of the project CloudSpaces: Open Service Platform for the Next Generation of Personal clouds (FP7-317555). ...
doi:10.1145/3029806.3029837
dblp:conf/codaspy/HarkousA17
fatcat:srtgbpssojb4rlqunq4gozin6u
A Pilot Study of an Inspection Framework for Automated Usability Guideline Reviews of Mobile Health Applications
2014
Proceedings of the Wireless Health 2014 on National Institutes of Health - WH '14
In the mobile domain, applications face more challenges to deliver good experiences to end users due to the characteristics and usage of mobile devices in ubiquitous computing contexts. ...
We hope this framework can be used to enforce a minimum bar for the usability of mobile health applications and further adapted when new products in the field are developed. ...
Any opinions, findings, and conclusions or recommendations expressed in this work are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. ...
doi:10.1145/2668883.2669585
dblp:conf/wh/XuDHC14
fatcat:47prb3kr5rhslfylhtcn24ru5m
Targeted Advertising on the Handset: Privacy and Security Challenges
[chapter]
2011
Pervasive Advertising
A key benefit of using mobile phones is to take advantage of the significant amount of information on phones -such as locations of interest to the user -in order to provide personalised advertisements. ...
In the final section of this chapter we describe some of the security mechanisms used in detecting click-through fraud, and techniques that can be used to ensure that the extra privacy protections of MobiAd ...
This is not an issue in general for desktops, but on a mobile phone numerous HTTP connections could slow down the browsing experience. ...
doi:10.1007/978-0-85729-352-7_6
dblp:series/hci/HaddadiHHB11
fatcat:65pjhgm2gjgpfnqhs2aquzedqu
Improving mobile internet usability
2001
Proceedings of the tenth international conference on World Wide Web - WWW '01
Evaluation and theoretical analysis of usability combined with innovative design can achieve significant improvements in user performance and satisfaction. ...
Although much progress has been made in terms of technological innovation, many of mobile internet systems are difficult to use, lack flexibility and robustness. They give a poor user experience. ...
Along with several other groups, we moved the focus of our work to wider usability issues of web-like browsing on small screens. ...
doi:10.1145/371920.372181
dblp:conf/www/BuchananFJTMP01
fatcat:j4bdnhsxhrg7ta3lstmwrxftga
When it's better to ask forgiveness than get permission
2013
Proceedings of the Ninth Symposium on Usable Privacy and Security - SOUPS '13
Smartphone applications pose interesting security problems because the same resources they use to enhance the user experience may also be used in ways that users might find objectionable. ...
First, we performed an online survey and found that, as attribution mechanisms have become available on the Android platform, users notice and use them. ...
This work was supported by the Intel Science and Technology Center for Secure Computing and the Air Force Office of Scientific Research (Grant #29182280-51677-C). ...
doi:10.1145/2501604.2501605
dblp:conf/soups/ThompsonJEWK13
fatcat:36kswemfv5bsng3rtzmnobflpa
Goldilocks and thetwomobile devices
2012
Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS '12
also aware of security and reliability limitations. ...
Fourteen participants out of 20 preferred these controls to existing security locks alone. ...
on their tablet, such as watching movies or browsing the web. ...
doi:10.1145/2335356.2335359
dblp:conf/soups/HayashiRSBS12
fatcat:67bk4ktskbco3hzxgdam5bzury
Reciprocity attacks
2011
Proceedings of the Seventh Symposium on Usable Privacy and Security - SOUPS '11
To the best of our knowledge, this is the first attempt to understand the impact of the norm of reciprocity as an attack in mobile and pervasive computing environments. ...
We implemented software to provide a rich shopping experience in a mobile and pervasive computing environment and embedded the reciprocity attack. ...
The band consists of Bono (vocals and guitar), The Edge (guitar, keyboards, and vocals), Adam Clayton (bass guitar) and Larry Mullen, Jr. (drums and percussion). ...
doi:10.1145/2078827.2078839
dblp:conf/soups/ZhuCKK11
fatcat:wn32bfo5wjalbfjlbgtzzrgjze
Usability Attributes for Mobile Applications: A Systematic Review
[chapter]
2019
Lecture Notes in Computer Science
The usability of mobile applications (apps) is an emerging area of research because of the increasing use of mobile devices around the world. ...
Based on this research, comprehensive guidelines for mobile apps' usability can then be provided. ...
attractiveness. 2013 Security The paper discusses the relationship between security and usability in mobile platforms; and how reducing various security threats can improve the usability of mobile apps ...
doi:10.1007/978-3-319-99966-1_5
fatcat:4g3m76wfg5h7pmstucktzcomcm
"My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security
2015
Symposium On Usable Privacy and Security
People with more articulated technical models perceived more privacy threats, possibly driven by their more accurate understanding of where specific risks could occur in the network. ...
Consistent with other work on user knowledge and experience, our study suggests a greater emphasis on policies and systems that protect privacy and security without relying too much on users' security ...
ACKNOWLEDGEMENTS We thank Katherine Mashek and Zachery Mullins for their help conducting interviews, and we thank Sauvik Das, members of the CoEX lab, David Naylor, Peter Steenkiste and other members of ...
dblp:conf/soups/KangDFK15
fatcat:77irzhzvmnghfba34ejnetoywa
The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings
2019
Symposium On Usable Privacy and Security
Generalization has important implications for the domains of usable security and human-computer interaction. ...
Further, with the increasing number of notifications in our lives across a range of mobile, Internet of Things, and computing devices, the accumulated effect of generalization may be substantial. ...
ACKNOWLEDGMENTS This was supported by the National Science Foundation under Grant CNS-1931108. ...
dblp:conf/soups/VanceEJKA19
fatcat:vxu4lww23feejc37srfmcacvme
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations
2022
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
These tools are mainly evaluated in terms of their accuracy in detecting vulnerabilities, but the evaluation of their usability is commonly neglected. ...
Usability of automated security tools is particularly crucial when dealing with problems of cryptographic protocols for which even small-apparently insignificant-changes in configuration can result in ...
We would also like to thank Matteo Rizzi for his work on NGINX-related mitigations. ...
doi:10.22667/jowua.2022.03.31.056
dblp:journals/jowua/ManfrediCSR22
fatcat:2wkcj4qubzecjmcvofkos422qu
« Previous
Showing results 1 — 15 out of 3,174 results