Reading 1 - Usable Encryption and Secure Messaging #
- Readings covered in lecture
- Alma Whitten and J.D. Tygar. Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of USENIX Security 1999]
- Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith. Obstacles to the Adoption of Secure Communication Tools In Proceedings of IEEE SP 2017.
- Anne Adams and Martina Angela Sasse. 1999. Users are not the enemy. Commun. ACM 42, 12 (December 1999), 40-46.
- James Mickens. This World of Ours. USENIX ;login:, January 2014.
- Additional Readings (choose one of these for your response)
- Omer Akgul, Ruba Abu-Salma, Wei Bai, Elissa M. Redmiles, Michelle L. Mazurek, and Blase Ur. From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging. In WPES 2021: Workshop on Privacy in the Electronic Society. November 2021.
- Matthias Fassl and Katharina Krombholz. Why I Can’t Authenticate — Understanding the Low Adoption of Authentication Ceremonies with Autoethnography. In Proceedings of CHI 2023.
Resources - Methods and Experimental Design #
- Readings Covered in Class
- Lazar et al. Chapter 3: Experimental Design
- Lazer et al. Chapter 4: Statistical Analysis
- Lazer et al. Chapter 5: Surveys
- Lazar et al. Chapter 8: Interviews and Focus Groups
- Lazer et al. Chapter 11: Analyzing Qualitative Data
- Thematic analysis: https://www.tandfonline.com/doi/epdf/10.1191/1478088706qp063oa?needAccess=true
- There are no additional readings or responses required
Reading 2 - Introduction to Privacy #
- Readings Covered in Class
- S. Warren and L. Brandeis. The Right to Privacy. Harver Law Review. 1890.
- Daniel Solove. I’ve got nothing to hide and other misunderstandings of privacy. San Diego Law Review. 2007.
- Naresh K. Malhotra, Sung S. Kim, James Agarwal. Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research. Vol 15. No 4. 2004.
- Additional Readings (choose one of these for your response)
- Oshrat Ayalon and Eran Toch. Evaluating Users’ Perceptions about a System’s Privacy: Differentiating between Social and Institutional Aspects. SOUPS 2019.
- Maggie Oates, Yama Ahmadullah, Abigail Marsh, Chelse Swoopes, Shikun Zhang, Rebecca Balebako, Lorrie Faith Cranor. Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration. PETS 2018.
Reading 3 - Security Warnings and Permissions #
- Readings Covered in Class
- Rob Reeder, Ellen Cram Kowalczyk, and Adam Shostack. Poster: Helping engineers design NEAT security warnings. SOUPS Poster 2011.
- Serge Egelman, Lorrie Faith Cranor, and Jason Hong. 2008. You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings. CHI 2008.
- Adrienne Porter Felt, Robert W. Reeder, Alex Ainslie, Helen Harris, Max Walker, Christopher Thompson, Mustafa Embre Acer, Elisabeth Morant, and Sunny Consolv. Rethinking Connection Security Indicators. SOUPS 2016.
- Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David A. Wagner:
Android permissions demystified. ACM Conference on Computer and Communications Security 2011. - Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. 2012. Android permissions: user attention, comprehension, and behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS ‘12).
- Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov: Android Permissions Remystified: A Field Study on Contextual Integrity. In proceedings USENIX Security Symposium 2015
- Additional Readings (choose one of these for your response)
- Prange, Sarah, Pascal Knierim, Gabriel Knoll, Felix Dietz, Alexander De Luca, and Florian Alt. “I do (not) need that Feature!”–Understanding Users’ Awareness and Control of Privacy Permissions on Android Smartphones. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), pp. 453-472. 2024.
- Tahaei, Mohammad, Ruba Abu-Salma, and Awais Rashid. “Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications.”. CHI 2023.
Reading 4 - Passwords and Password Managers #
- Readings Covered in Lecture
- Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, and Frank Stajano. Passwords and the evolution of imperfect authentication. Communications of the ACM 58, 7 (July 2015), 78–87.
- Joseph Bonneau. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. In Proceedings of IEEE SP 2012.
- Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, Blase Ur. Measuring Password Guessability for an Entire University. In Proceedings of CCS 2013.
- Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor. “I Added ‘!’ at the End to Make It Secure”: Observing Password Creation in the Lab. In the proceedings of SOUPS 2015.
- Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes and Sven Bugiel. Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. USENIX 2018.
- Sarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. Why people (don’t) use password managers effectively. SOUPS 2019.
- Additional Readings (choose one of these for your response)
- Collins W. Munyendo, Peter Mayer and Adam J. Aviv. “I Just Stopped Using One and Started Using the Other”: Motivations, Techniques, and Challenges When Switching Password Managers. CCS 2023.
- Patricia Arias Cabarcos, Peter Mayer. The more accounts I use, the less I have to think’: A Longitudinal Study on the Usability of Password Managers for Novice Users. SOUPS 2025.
Reading 5 - Spam, Phishing, and Ethics #
- Readings Covered in Class
- The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Departmnet of Homeland Security. 2012. (No need to write a report, but MUST read)
- Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G. M., Paxson, V., & Savage, S. Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the CCS. 2008.
- Rachna Dhamija, J. D. Tygar, and Marti Hearst. Why phishing works. CHI 2006.
- Rick Wash and Molly M. Cooper. Who Provides Phishing Training? Facts, Stories, and People Like Me. In Proceedings of CHI 2018.
-
Additional Readings (choose one of these for your response)
- Rajvardhan Oak and Zubair Shafiq, University of California, Davis. “Hello, is this Anna?”: Unpacking the Lifecycle of Pig-Butchering Scams. SOUPS 2025.
- Daniele Lain, Kari Kostiainen, Srdjan Čapkun. Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. IEEE S&P 2022.
Reading 6 - Deep Dive Presentations 1 #
- Readings Covered in Lecture
- Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir Memon. Peeling the Onion’s User Experience Layer: Examining Naturalistic Use of the Tor Browser. In Proceedings of CCS 2018.
- Matthias Fassl, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz. Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon. In Proceedings of the ACM on Human-computer Interaction. Vol 7. 2023.
- Peter Story, Daniel Smullen, Yaxing Yao, Alessandro Acquisti, Lorrie F. Cranor, Norman Sadeh, Florian Schaub. Awareness, Adoption, and Misconceptions of Web Privacy Tools. In Proceedings of PoPETs 2021.
- Keswani, I., et al. (2025).User Understandings of Technical Terms in App Privacy Labels. SOUPS 2025.
- Balash, D. G., et al. (2024). “I would not install an app with this label”: Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps. SOUPS 2024.
- Tang, J., et al. (2021). Defining Privacy: How Users Interpret Technical Terms in Privacy Policies. Proceedings on Privacy Enhancing Technologies. 2021.
- Chaum, David, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter YA Ryan, Emily Shen, and Alan T. Sherman. “Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.” EVT 8, no. 1 (2008): 13.
- Volkamer, Melanie, Oksana Kulyk, Jonas Ludwig, and Niklas Fuhrberg. “Increasing security without decreasing usability: A comparison of various verifiable voting systems.” In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), pp. 233-252. 2022.
- Müller, Johannes, Balázs Pejó, and Ivan Pryvalov. “Devos: deniable yet verifiable vote updating.” Proceedings on Privacy Enhancing Technologies (2024).
- Margarita Grinko, Sarvin Qalandar, Dave Randall, and Volker Wulf. 2022. Nationalizing the Internet to Breaka Protest Movement: Internet Shutdown and Counter-Appropriation in Iran of Late 2019. Proc. ACM Hum.-Comput. Interact. 6, CSCW2, Article 314 (November 2022), 21 pages.
- Yichao Cui, Naomi Yamashita, and Yi-Chieh Lee. 2022. “We Gather Together We Collaborate Together”:Exploring the Challenges and Strategies of Chinese Lesbian and Bisexual Women’s Online Communities onWeibo. Proc. ACM Hum.-Comput. Interact. 6, CSCW2, Article 423
- Zaid Hakami, Yuzhou Feng, and Bogdan Carbunar. 2025. Cooperative Dynamics of Censorship,Misinformation, and Influence Operations: Insights from the Global South and U.S. Proc. ACM Hum.-Comput.Interact. 9, 7, Article CSCW391 (November 2025), 35 pages.
- Bielova, N., Litvine, L., Nguyen, A., Chammat, M., Toubiana, V., & Hary, E. (2024). The effect of designpatterns on (present and future) cookie consent decisions. In Proceedings of the 33rd USENIXSecurity Symposium (USENIX Security ’24). USENIX Association.
- Gray, C. M., Chen, J., Chivukula, S. S., & Qu, L. (2021). End user accounts of dark patterns as felt manipulation. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW2), Article 372.
- Habib, H., & Cranor, L. F. (2022). Evaluating the usability of privacy choice mechanisms. In Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association.
- Additional Readings (choose one of these for your response)
- Kevin Gallagher, Sameer Patil, Nasir Memon.New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. In Proceedings of SOUPS 2017.
- Adhikari, A., Das, S., & Dewri, R. (2023). Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades. Proceedings on Privacy Enhancing Technologies
- Haines, Thomas, Johannes Mueller, Rafieh Mosaheb, and Ivan Pryvalov. “Sok: Secure e-voting with everlasting privacy.” In Privacy Enhancing Technologies Symposium (PETS). 2023.
- Zi Li and Bonnie Nardi. 2021. “There Should Be More Than One Voice in A Healthy Society”:Infrastructural Violence and Totalitarian Computing in China. Proc. ACM Hum.-Comput. Interact. 5, CSCW2,Article 329 (October 2021), 25 pages.
- Maier, N. R., Zimmermann, V., Möller, S., & Diefenbach, S. (2023). About engaging and governing strategies: A thematic analysis of dark patterns in social networking services. In Proceedings of the2023 CHI Conference on Human Factors in Computing Systems (CHI ’23). Association for Computing Machinery (ACM).
Reading 7 - Deep Dive Presentations 2 #
- Readings Covered in Lecture
- Schlesinger, A., Chandrasekharan, E., Masden, C. A., Bruckman, A. S., Edwards, W. K., & Grinter, R. E. (2017,May). Situated anonymity: Impacts of anonymity, ephemerality, and hyper-locality on social media. InProceedings of the 2017 CHI conference on human factors in computing systems (pp. 6912-6924).
-
Mondal, M., Messias, J., Ghosh, S., Gummadi, K. P., & Kate, A. (2016). Forgetting in social media:Understanding and controlling longitudinal exposure of socially shared data. In Twelfth Symposium on UsablePrivacy and Security (SOUPS 2016) (pp. 287-299).
- Warford, N., Munyendo, C. W., Mediratta, A., Aviv, A. J., & Mazurek, M. L. (2021). Strategies and perceivedrisks of sending sensitive documents. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 1217-1234)
- Franz, Anjuli, et al. “SoK: Still Plenty of Phish in the Sea — A Taxonomy of User-Oriented Phishing Interventions and Avenuesfor Future Research.” Proceedings of the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), USENI XAssociation, Aug. 2021, pp. 339-358. USENIX
- Timko, Daniel, Castillo Hernandez, Daniel, and Muhammad Lutfor Rahman. “Understanding Influences on SMS Phishing Detection: User Behaviour, Demographics, and Message Attributes.” Symposium on Usable Security and Privacy (USEC2025), The Internet Society / NDSS,
- Pilavakis, Nikolas, Adam Jenkins, Nadin Kökciyan, and Kami Vaniea. “I Didn’t Click”: What Users Say When ReportingPhishing.” Symposium on Usable Security and Privacy (USEC) 2023.
- Anh Pham, Italo Dacosta, Guillaume Endignoux, Juan Ramón Troncoso-Pastoriza, Kévin Huguenin, and Jean-PierreHubaux. 2017. ORide: a privacy-preserving yet accountable ride-hailing service. In Proceedings of the 26th USENIX Conference on Security Symposium (SEC’17). USENIX Association, USA, 1235–1252
- Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, and Florian Kerschbaum. Caring about Sharing: User Perceptions of Multiparty Data Sharing. USENIX Sec. 2022.
- Rao, V., Dalal, S., Agarwal, E., Calacci, D., & Monroy-Hernández, A. (2025). Rideshare Transparency: Translating GigWorker Insights on AI Platform Design to Policy. Proceedings of the ACM on Human-Computer Interaction, 9(2),Article 161, 1–49.
- Akter, Mamtaj, Amy J. Godfrey, Jess Kropczynski, Heather R. Lipford, and Pamela J. Wisniewski. “From parental control to joint family oversight: Can parents and teens manage mobile online safety and privacy as equals?.” Proceedings of the ACM on Human-Computer Interaction 6, no. CSCW1 (2022): 1-28.
- Dumaru, Prakriti, and Mahdi Nasrullah Al-Ameen. “One Size Doesn’t Fit All: Towards Design and Evaluation of Developmentally Appropriate Parental Control Tool.” In Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems, pp. 1-22. 2025.
- Ma, Renkai, Yao Li, Sunhye Bai, Yubo Kou, and Xinning Gui. “Weighing Benefits and Harms: Parental Mediation on Social Video Platforms.” In Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems, pp. 1-26. 2025.
- Mink, J., Luo, L., Barbosa, N. M., Figueira, O., Wang, Y., & Wang, G. DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks.. USENIX Sec. 2022.
- Kevin Warren, Tyler Tucker, Anna Crowder, Daniel Olszewski, Allison Lu, Caroline Fedele, Magdalena Pasternak, Seth Layton, Kevin Butler, Carrie Gates, and Patrick Traynor. “Better Be Computer or I’m Dumb”: A Large-Scale Evaluation of Humans as Audio Deepfake Detectors. In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS ’24)
- Dilrukshi Gamage, Piyush Ghasiya, Vamshi Bonagiri, Mark E. Whiting, and Kazutoshi Sasahara. 2022. Are Deepfakes Concerning? Analyzing Conversations of Deepfakes on Reddit and Exploring Societal Implications. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (CHI ‘22)
- Chen, Y., Arjun Arunasalam, & Z. Berkay Celik. (2023). Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions. Annual Computer Security Applications Conference.
- Zhang, Zhiping, Michelle Jia, Hao-Ping Lee, Bingsheng Yao, Sauvik Das, Ada Lerner, Dakuo Wang, and Tianshi Li. “It’s a Fair Game”, or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents. In Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems, pp. 1-26. 2024.
- Kwesi, Jabari, Jiaxun Cao, Riya Manchanda, and Pardis Emami-Naeini. “Exploring user security and privacy attitudes and concerns toward the use of General-Purpose LLM chatbots for mental health.” In 34th USENIX Security Symposium (USENIX Security 25), pp. 6007-6024. 2025.
- Additional Readings (choose one of these for your response)
- De Luca, A., Das, S., Ortlieb, M., Ion, I., & Laurie, B. (2016). Expert and Non-Expert attitudes towards(secure) instant messaging. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) (pp. 147-157).
- Chen, Xiaowei, Sophie Doublet, Anastasia Sergeeva, Gabriele Lenzini, Vincent Koenig, and Verena Distler. “What Motivatesand Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory.” Proceedings of the Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), USENIX Association, 2024.
- Mareike Glöss, Moira McGregor, and Barry Brown. 2016. Designing for Labour: Uber and the On-Demand Mobile Workforce. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI ‘16).Association for Computing Machinery, New York, NY, USA, 1632–1643.
- Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, and Gang Wang. It’s Trying Too Hard to Look Real: Deepfake Moderation Mistakes and Identity-Based Bias. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI ’24)
- Tolsdorf, Jan, Alan F. Luo, Monica Kodwani, Junho Eum, Mahmood Sharif, Michelle L. Mazurek, and Adam J. Aviv. “Safety Perceptions of Generative {AI} Conversational Agents: Uncovering Perceptual Differences in Trust, Risk, and Fairness.” In Twenty-First Symposium on Usable Privacy and Security (SOUPS 2025), pp. 93-112. 2025.
Reading 8 - Deep Dive Presentations 3 #
- Readings Covered in Lecture
- Ahmed, Dilawer, Aafaq Sabir, and Anupam Das. “Spying through your voice assistants: realistic voice command fingerprinting.” In 32nd USENIX Security Symposium (USENIX Security 23), pp. 2419-2436. 2023.
- Sharma, Vandit, and Mainack Mondal. “Understanding and improving usability of data dashboards for simplified privacy control of voice assistant data.” In 31st USENIX Security Symposium (USENIX Security 22), pp. 3379-3395. 2022.
- Ahmed, Shimaa, Ilia Shumailov, Nicolas Papernot, and Kassem Fawaz. “Towards more robust keyword spotting for voice assistants.” In 31st USENIX security symposium (USENIX Security 22), pp. 2655-2672. 2022.
- Oak, Rajvardhan, and Zubair Shafiq. “Victims, Vigilantes, and Advice Givers: An Analysis of {Scam-Related} Discourse on Reddit.” Twenty-First Symposium on Usable Privacy and Security (SOUPS 2025). 2025.
- Siu, Gilberto Atondo, and Alice Hutchings. ““Get a higher return on your savings!”: Comparing adverts for cryptocurrency investment scams across platforms.” 2023 IEEE European symposium on security and privacy workshops (EuroS&PW). IEEE, 2023.
- Li, Xigao, Amir Rahmati, and Nick Nikiforakis. “Like, comment, get scammed: Characterizing comment scams on media platforms.” Network and Distributed System Security (NDSS) Symposium, 2024.
- Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, and Bryan Semaan. 2020. “I am uncomfortable sharing what I can’t see”: Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. In Proceedings of the 29th USENIX Security Symposium. USENIX Association, Berkeley, CA, USA, 1929-1948.
- Taslima Akter, Tousif Ahmed, Apu Kapadia, and Manohar Swaminathan. 2020. Privacy Considerations of the Visually Impaired with Camera Based Assistive Technologies: Misrepresentation, Impropriety, and Fairness. In Proceedings of the 22nd International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS ‘20). Association for Computing Machinery, New York, NY, USA, 1-14.
- Yuhang Zhao, Yaxing Yao, Jiaru Fu, and Nihan Zhou. 2023. “If sighted people know, I should be able to know:” Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology. In Proceedings of the 32nd USENIX Security Symposium. USENIX Association, Berkeley, CA, USA, 4661-4678.
- Prybylo, M., Haghighi, S., Peddinti, S. T., & Ghanavati, S. (2024). Evaluating privacy perceptions, experience, and behavior of software development teams. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024)
- Tahaei, M., Li, T., & Vaniea, K. (2022). Understanding privacy-related advice on stack overflow. Proceedings on Privacy Enhancing Technologies
- Horstmann, S. A., Domiks, S., Gutfleisch, M., Tran, M., Acar, Y., Moonsamy, V., & Naiakshina, A. (2024). “Those things are written by lawyers, and programmers are reading that.” Mapping the Communication Gap Between Software Developers and Privacy Experts. Proceedings on Privacy Enhancing Technologies
- Bhagavatula, S., Bauer, L., Kapadia, A. 2021) “(How) Do people change their passwords after a breach?”. USENIX. Login;
- Ur, Blase, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. “(“I Added’!’at the End to Make It Secure”: Observing Password Creation in the Lab.” In Eleventh symposium on usable privacy and security (SOUPS 2015), pp. 123-140. 2015.
- Maftei, Alexandra, and Oana Dănilă. “Give me your password! What are you hiding? Associated factors of intimate partner violence through technological abuse.” Current psychology 42, no. 11 (2023): 8781-8797.
- Voskobojnikov, A., Wiese, O., Mehrabi Koushki, M., Roth, V., & Beznosov, K. (2021). The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Article 642). Association for Computing Machinery.
- Yu, Y., Sharma, T., Das, S., & Wang, Y. (2024). “Don’t put all your eggs in one basket”: How Cryptocurrency Users Choose and Secure Their Wallets. In Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems (Article 353). Association for Computing Machinery.
- Bappy, F. H., Cheon, E., & Islam, T. (2025). Centralized Trust in Decentralized Systems: Unveiling Hidden Contradictions in Blockchain and Cryptocurrency. In Proceedings of the 2025 ACM Conference on Fairness, Accountability, and Transparency (pp. 1960–1971). Association for Computing Machinery.
- Additional Readings (choose one of these for your response)
- Ponticello, Alexander, Matthias Fassl, and Katharina Krombholz. “Exploring authentication for {Security-Sensitive} tasks on smart home voice assistants.” In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), pp. 475-492. 2021.
- Acharya, Bhupendra, et al. “Conning the crypto conman: End-to-end analysis of cryptocurrency-based technical support scams.” 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024.
- Abigale Stangl, Emma Sadjo, Pardis Emami-Naeini, Yang Wang, Danna Gurari, and Leah Findlater. 2023. “Dump it, Destroy it, Send it to Data Heaven”: Blind People’s Expectations for Visual Privacy in Visual Assistance Technologies. In Proceedings of the 20th International Web for All Conference (W4A ‘23). Association for Computing Machinery, New York, NY, USA, 134–147.
- Assal, H., & Chiasson, S. (2019, May). ‘Think secure from the beginning’ A Survey with Software Developers. In Proceedings of the 2019 CHI conference on human factors in computing systems
- Freed, Diana, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, and Nicola Dell. ““Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions With Survivors of Intimate Partner Violence.” Proceedings of the ACM on Human-Computer Interaction 3, no. CSCW (2019): 1-24.
- Fröhlich, M., Gutjahr, F., & Alt, F. (2020). Don’t lose your coin! Investigating Security Practices of Cryptocurrency Users. In Proceedings of the 2020 ACM Designing Interactive Systems Conference (pp. 1751–1763). Association for Computing Machinery.
Reading 9 - Guest Lecture TBD #
- Topics and reading TBD
Reading 10 - Guest Lecture TBD #
- Topics and reading TBD