Valid and reliable measurement instruments are crucial for human factors...
Attribute-based Credential Systems (ACS) have been long proposed as
priv...
Internet Users' Information Privacy Concerns (IUIPC-10) is one of the mo...
Background. In recent years, cyber security security user studies have b...
Background. 3-D Secure 2.0 (3DS 2.0) is an identity federation protocol
...
Background. The current cognitive state, such as cognitive effort and
de...
Background. Incidental emotions users feel during their online activitie...
Studies in socio-technical aspects of security often rely on user studie...