4 Hits in 2.0 sec

Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies [article]

Thomas Groß
2020 arXiv   pre-print
To ascertain this capacity, we investigated the reporting fidelity of security user studies.  ...  Studies in socio-technical aspects of security often rely on user studies and statistical inferences on investigated relations to make their case.  ...  Methods for Cyber Security" (Pathway I led by Thomas Groß).  ... 
arXiv:2004.06672v1 fatcat:iy3tbpcolbe6xjsc2cngifntgu

On the importance of ecologically valid usable security research for end users and IT workers [article]

Sascha Fahl, University, My
[129] investigated a mechanism called Telepathwords. Telepathwords is intended to discourage the creation of weak, predictable passwords.  ...  In an MTurk study with 2,560 participants, they found that participants using Telepathwords created significantly fewer weak passwords compared to conventional password creation policies.  ...  How often have you forgotten your Facebook password in the last 12 months? Choose one answer: Never, Once, Twice, Three times, More than three times, n/a, I don't know, Other.  ... 
doi:10.15488/8668 fatcat:7oh5c5uplrdbdhwnejmhnfo5fi

Supporting Password-Security Decisions with Data

Blase Eric Ur
I also examine the relationship between users' perceptions of password security and passwords' actual security, finding that while users often correctly judge the security impact of individual password  ...  In this thesis, I use data-driven methods to better understand how users choose passwords and how attackers guess passwords.  ...  We examined scoring mechanisms both by reading the Javascript source of the page, when available, and by testing sample passwords in each meter.  ... 
doi:10.1184/r1/6723416 fatcat:zj5suvg2kjfmpkavs4fg6r2kvm

Dark side of UGC: A user-centric perspective on the impact of user-generated content [article]

Ankit Kariryaa, Universität Bremen, Johannes Schöning
Third, we present a personal password meter for limiting the impact of UGC on the online privacy of the users.  ...  Through a user study, we find that our tool significantly limits the inclusion of personal information in passwords, thus limiting the negative impacts of UGC on online security.  ...  The main idea of this approach was to help users to create stronger passwords by demonstrating that the system could easily guess the next characters in case of a weak password.  ... 
doi:10.26092/elib/331 fatcat:ypaovoi2bbah5j2imnhl5jmd6a