Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2015
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior
- Richard Shay,
- Lujo Bauer,
- Nicolas Christin,
- Lorrie Faith Cranor,
- Alain Forget,
- Saranga Komanduri,
- Michelle L. Mazurek,
- William Melicher,
- Sean M. Segreti,
- Blase Ur
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing SystemsPages 2903–2912https://doi.org/10.1145/2702123.2702586Users often struggle to create passwords under strict requirements. To make this process easier, some providers present real-time feedback during password creation, indicating which requirements are not yet met. Other providers guide users through a ...
- research-articleApril 2015
Crowdsourced Exploration of Security Configurations
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing SystemsPages 467–476https://doi.org/10.1145/2702123.2702370Smartphone apps today request permission to access a multitude of sensitive resources, which users must accept completely during installation (e.g., on Android) or selectively configure after installation (e.g., on iOS, but also planned for Android). ...
- research-articleApril 2015
Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing SystemsPages 1669–1678https://doi.org/10.1145/2702123.2702251We are approaching an environment where ubiquitous computing devices will constantly accept input via audio and video channels: kiosks that determine demographic information of passersby, gesture controlled home entertainment systems and audio ...
- noteApril 2015
Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing SystemsPages 2339–2342https://doi.org/10.1145/2702123.2702202We performed a systematic evaluation of the shoulder surfing susceptibility of the Android pattern (un)lock. The results of an online study (n=298) enabled us to quantify the influence of pattern length, line visibility, number of knight moves, number ...