Out of the Lab Resarch in Usable Security and Privacy
Title of conference publication:
Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization (UMAP ’21 Adjunct),
Conference title:
ACM Conference on User Modeling, Adaptation and Personalization (29., 2021, Utrecht)
Venue:
Utrecht, Niederlande
Year of conference:
2021
Date of conference beginning:
21.06.2021
Date of conference ending:
25.06.2021
Place of publication:
New York, NY, USA
Publisher:
Association for Computing Machinery
Year:
2021
Pages from - to:
363-365
Language:
Englisch
Abstract:
The COVID pandemic made it challenging for usable security and privacy researchers around the globe to run experiments involving human subjects, specifically in cases where such experiments are conducted in controlled lab setting. Examples include but are not limited to (a) observing and collecting data on user behavior with the goal of (b) informing the design and (c) engineering novel concepts based on adaptation and personalization as well as (d) evaluating such concepts regarding user performance and robustness against different threat models. In this keynote I will set out with providing a brief introduction to and examples on our research on behavioral biometrics. I will then discuss how the current situation influences research requiring close work with human subjects in lab settings and outline approaches to address emerging issues. Finally, I will provide some examples of out-of-the-lab research and reflect on both challenges and opportunities of these approaches. «
The COVID pandemic made it challenging for usable security and privacy researchers around the globe to run experiments involving human subjects, specifically in cases where such experiments are conducted in controlled lab setting. Examples include but are not limited to (a) observing and collecting data on user behavior with the goal of (b) informing the design and (c) engineering novel concepts based on adaptation and personalization as well as (d) evaluating such concepts regarding user perfor... »