An ongoing discussion in the field of usable privacy and security debates whether security mechanisms should be visible to end-users during interactions with technology, or hidden away. This paper addresses this question using a mixed-methods approach, focusing on encryption as a mechanism for confidentiality during data transmission on a smartphone application. In study 1, we conducted a qualitative co-creation study with security and Human-Computer Interaction (HCI) experts (N = 9) to create appropriate textual and visual representations of the security mechanism encryption in data transmission. We investigated this question in two contexts: online banking and e-voting. In study 2, we put these ideas to the test by presenting these visual...
The increasing magnitude and sophistication of malicious cyber activities by various threat actors p...
Protecting smartphones against security threats is a multidimensional problem involving human and te...
Smartphones are a central part of modern life and contain vast amounts of personal and professional ...
An ongoing discussion in the field of usable privacy and security debates whether security mechanism...
When communication about security to end users is ineffective, people frequently misinterpret the pr...
Communication tools with end-to-end (E2E) encryption help users maintain their privacy. Although mes...
In traditional interactions that do not rely on technology, most people are able to assess risks to ...
\u3cp\u3eAn unsolved debate in the field of usable security concerns whether security mechanisms sho...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
often must make security and privacy decisions, yet they are rarely equipped to do so. We ask users ...
The joint study of computer security, privacy and human-computer interaction (HCI) over the last two...
Computer security and privacy experts have always advocated the widespread adoption of privacy-enhan...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
The increasing magnitude and sophistication of malicious cyber activities by various threat actors p...
Protecting smartphones against security threats is a multidimensional problem involving human and te...
Smartphones are a central part of modern life and contain vast amounts of personal and professional ...
An ongoing discussion in the field of usable privacy and security debates whether security mechanism...
When communication about security to end users is ineffective, people frequently misinterpret the pr...
Communication tools with end-to-end (E2E) encryption help users maintain their privacy. Although mes...
In traditional interactions that do not rely on technology, most people are able to assess risks to ...
\u3cp\u3eAn unsolved debate in the field of usable security concerns whether security mechanisms sho...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
often must make security and privacy decisions, yet they are rarely equipped to do so. We ask users ...
The joint study of computer security, privacy and human-computer interaction (HCI) over the last two...
Computer security and privacy experts have always advocated the widespread adoption of privacy-enhan...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
The increasing magnitude and sophistication of malicious cyber activities by various threat actors p...
Protecting smartphones against security threats is a multidimensional problem involving human and te...
Smartphones are a central part of modern life and contain vast amounts of personal and professional ...