Beyond the Office Walls: Understanding Security and Shadow Security Behaviours in a Remote Work Context
Sarah Alromaih and Ivan Flechais, University of Oxford; George Chalhoub, University College London & University of Oxford
“I do (not) need that Feature!” – Understanding Users’ Awareness and Control of Privacy Permissions on Android Smartphones
Sarah Prange, University of Bundeswehr, Munich; Pascal Knierim, Universität Innsbruck; Gabriel Knoll, LMU Munich; Felix Dietz, University of Bundeswehr, Munich; Alexander De Luca, Google Munich; Florian Alt, University of the Bundeswehr Munich
Threat modeling state of practice in Dutch organizations
Stef Verreydt, Koen Yskout, Laurens Sion, and Wouter Joosen, DistriNet, KU Leuven
Exploring Expandable-Grid Designs to Make Mobile App Privacy Labels More Usable
Shikun Zhang and Lily Klucinec, Carnegie Mellon University; Kyerra Norton, Washington University in St. Louis; Norman Sadeh and Lorrie Faith Cranor, Carnegie Mellon University
"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies' on User Perceptions of Verified Accounts
Carson Powers, Nickolas Gravel, and Christopher Pellegrini, Tufts University; Micah Sherr, Georgetown University; Michelle L. Mazurek, University of Maryland; Daniel Votipka, Tufts University
Write, Read, or Fix? Exploring Alternative Methods for Secure Development Studies
Kelsey R. Fulton, Colorado School of Mines; Joseph Lewis, University of Maryland; Nathan Malkin, New Jersey Institute of Technology; Michelle L. Mazurek, University of Maryland
Understanding How People Share Passwords
Phoebe Moh and Andrew Yang, University of Maryland; Nathan Malkin, New Jersey Institute of Technology; Michelle L. Mazurek, University of Maryland
What Drives SMiShing Susceptibility? A U.S. Interview Study of How and Why Mobile Phone Users Judge Text Messages to be Real or Fake
Sarah Tabassum, Cori Faklaris, and Heather Lipford, University of North Carolina at Charlotte
Navigating Autonomy: Unveiling Security Experts' Perspectives on Augmented Intelligence in Cybersecurity
Neele Roch, Hannah Sievers, Lorin Schöni, and Verena Zimmermann, ETH Zürich
Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario
Maximilian Häring and Julia Angelika Grohs, University of Bonn; Eva Tiefenau, Fraunhofer FKIE; Matthew Smith, University of Bonn, Fraunhofer FKIE; Christian Tiefenau, University of Bonn
How Entertainment Journalists Manage Online Hate and Harassment
Noel Warford, Oberlin College; Nicholas Farber and Michelle Mazurek, University of Maryland
Digital Nudges for Access Reviews
Thomas Baumer, Nexis GmbH; Tobias Reittinger, Universität Regensburg; Sascha Kern, Nexis GmbH; Günther Pernul, Universität Regensburg
Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts
Miuyin Yong, Matthew Landen, Frank Li, and Fabian Monrose, Mustaque Ahamad, Georgia Institute of Technology
Comparing Teacher and Creator Perspectives on the Design of Cybersecurity and Privacy Educational Resources
Joy McLeod, Carleton University; Leah Zhang-Kennedy, University of Waterloo, Stratford Campus; Elizabeth Stobert, Carleton University
"My phone's lying out on Thanksgiving and Grandma picks it up." User Threat Models for Using Vault Apps
Chris Geeng, NYU; Natalie Chen, unaffiliated; Kieron Ivy Turk, University of Cambridge; Jevan Hutson, unaffiliated; Damon McCoy, NYU
Beyond Fear and Frustration - Towards a Holistic Understanding of Emotions in Cybersecurity
Alexandra von Preuschen and Monika C. Schuhmacher, Justus-Liebig-University Gießen; Verena Zimmermann, ETH Zürich
Well-intended but half-hearted: Hosts’ consideration of guests’ privacy using smart devices on rental properties
Sunyup Park, University of Maryland, College Park; Weijia He, Dartmouth College; Elmira Deldari, University of Maryland, Baltimore County; Pardis Emami-Naeini, Duke University; Danny Yuxing Huang, New York University; Jessica Vitak, University of Maryland; Yaxing Yao, Virginia Tech; Michael Zimmer, Marquette University
Batman Hacked My Password: A Subtitle-Based Analysis of Password Depiction in Movies
Maike M. Raphael, Leibniz University Hannover; Aikaterini Kanta, University of Portsmouth; Rico Seebonn, Leibniz University Hannover; Camille Cobb, University of Illinois Urbana-Champaign; Markus Dürmuth, Leibniz University Hannover
"Custodian of Online Communities": Investigating Mutual Support among Moderators in Managing Community Safety
Madiha Tabassum, Northeastern University; Alana Mackey, Wellesley College; Ada Lerner, Northeastern University
Privacy Communication Patterns for Domestic Robots
Maximiliane Windl, LMU Munich, Munich Center for Machine Learning (MCML); Jan Leusmann, Albrecht Schmidt, and Sebastian S. Feger, LMU Munich; Sven Mayer, LMU Munich, Munich Center for Machine Learning (MCML)
"I don't know how much power I have over his stream": Co-design the Informing Process with Streamers and Bystanders in Live Streaming
Yanlai Wu, University of Central Florida; Xinning Gui, Pennsylvania State University; Yuhan Luo, City University of Hong Kong; Yao Li, University of Central Florida
Evaluating the Usability of Differential Privacy Tools with Data Practitioners
Ivoline C. Ngong, Brad Stenger, Joseph P. Near, and Yuanyuan Feng, University of Vermont
Towards Bridging the Research-Practice Gap: Understanding Researcher-Practitioner Interactions and Challenges in Human-Centered Cybersecurity
Julie Haney, Clyburn Cunningham, and Susanne Furman, National Institute of Standards and Technology
Privacy Requirements and Realities of Digital Public Goods
Geetika Gopi and Aadyaa Maddi, Carnegie Mellon University; Omkhar Arasaratnam, The Linux Foundation; Giulia Fanti, Carnegie Mellon University
"It was honestly just gambling": Investigating the Experiences of Teenage Cryptocurrency Users on Reddit
Elijah Bouma-Sims, Hiba Hassan, Alexandra Nisenoff, Lorrie Faith Cranor, and Nicolas Christin, Carnegie Mellon University
"Violation of my body:" Perceptions of AI-generated non-consensual (intimate) imagery
Natalie Brigham, Miranda Wei, and Tadayoshi Kohno, University of Washington; Elissa Redmiles, Georgetown University
What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory
Xiaowei Chen, Sophie Doublet, Anastasia Sergeeva, Gabriele Lenzini, and Vincent Koenig, University of Luxembourg; Verena Distler, University of the Bundeswehr Munich
Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams
Maxwell Prybylo and Sara Haghighi, University of Maine; Sai Teja Peddinti, Google; Sepideh Ghanavati, University of Maine
Negative Effects of Social Triggers on User Security and Privacy Behaviors
Lachlan Moore, Waseda University / NICT; Tatsuya Mori, Waseda University / NICT / RIKEN AIP; Ayako A. Hasegawa, NICT
A Survey of Cybersecurity Professionals’ Perceptions and Experiences of Safety and Belonging in the Community
Samantha Katcher, Liana Wang, and Caroline Yang, Tufts University; Chloé Messdaghi, SustainCyber; Michelle Mazurek, University of Maryland; Marshini Chetty, University of Chicago; Kelsey R. Fulton, Colorado School of Mines; Daniel Votipka, Tufts University
Who is the IT Department Anyway: An Evaluative Case Study of Shadow IT Mindsets Among Corporate Employees
Jan-Philip van Acken, Floris Jansen, Slinger Jansen, and Katsiaryna Labunets, Utrecht University
Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field
Nina Gerber and Alina Stöver, Technical University of Darmstadt; Peter Mayer, University of Southern Denmark
"I would not install an app with this label": Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps
David G. Balash, University of Richmond; Mir Masood Ali and Chris Kanich, UIC; Adam J. Aviv, The George Washington University