An evaluation of three designs to engage users when providing their consent on smartphones
暂无分享,去创建一个
[1] Lujo Bauer,et al. A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality , 2013, Digital Identity Management.
[2] Andrew Sears,et al. International Aspects of World Wide Web Usability and the Role of High-End Graphical Enhancements , 2000, Int. J. Hum. Comput. Interact..
[3] Ya-li Wu,et al. [null]. , 2019, Zhongguo ying yong sheng li xue za zhi = Zhongguo yingyong shenglixue zazhi = Chinese journal of applied physiology.
[4] John Sören Pettersson,et al. Towards the Adoption of Secure Cloud Identity Services , 2017, ARES.
[5] Serge Egelman,et al. My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect , 2013, CHI.
[6] Matthew Chalmers,et al. Improving consent in large scale mobile HCI through personalised representations of data , 2014, NordiCHI.
[7] S. Shyam Sundar,et al. Power of the Swipe: Why Mobile Websites Should Add Horizontal Swiping to Tapping, Clicking, and Scrolling Interaction Techniques , 2016, Int. J. Hum. Comput. Interact..
[8] Mohamed Shehab,et al. Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook , 2016, DPM/QASA@ESORICS.
[9] Yi Wu,et al. Swiping vs. Scrolling in Mobile Shopping Applications , 2016, HCI.
[10] Qian Xu,et al. User Experience of On-Screen Interaction Techniques: An Experimental Investigation of Clicking, Sliding, Zooming, Hovering, Dragging, and Flipping , 2014, Hum. Comput. Interact..
[11] Scott Ruoti,et al. Authentication Melee: A Usability Analysis of Seven Web Authentication Systems , 2015, WWW.
[12] John Sören Pettersson,et al. Making PRIME usable , 2005, SOUPS '05.
[13] Lorrie Faith Cranor,et al. Your attention please: designing security-decision UIs to make genuine risks harder to ignore , 2013, SOUPS.
[14] Scott Ruoti,et al. Standard Metrics and Scenarios for Usable Authentication , 2016, WAY@SOUPS.
[15] Barry Werth,et al. How short is too short? , 1991, The New York times magazine.
[16] Bernd Zwattendorfer,et al. CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[17] John Sören Pettersson,et al. Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood , 2018, ARES.
[18] Surajit Ghosh Dastidar,et al. Impact of the Factors Influencing Website Usability on User Satisfaction , 2009 .
[19] Melanie Volkamer,et al. Helping john to make informed decisions on using social login , 2018, SAC.
[20] Andrew S. Patrick,et al. From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions , 2003, Privacy Enhancing Technologies.
[21] Alan Cooper,et al. About Face 3: the essentials of interaction design , 1995 .
[22] Blase Ur,et al. Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption , 2015 .
[23] Alfred Kobsa,et al. Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior , 2004, Privacy Enhancing Technologies.
[24] D. Norman. The Design of Everyday Things: Revised and Expanded Edition , 2013 .
[25] José Carlos Brustoloni,et al. Improving security decisions with polymorphic and audited dialogs , 2007, SOUPS '07.
[26] Philip T. Kortum,et al. Determining what individual SUS scores mean: adding an adjective rating scale , 2009 .
[27] J. B. Brooke,et al. SUS: a retrospective , 2013 .
[28] Janet Horowitz Murray,et al. Inventing the Medium: Principles of Interaction Design as a Cultural Practice , 2011 .
[29] John Sören Pettersson,et al. User Evaluations of an App Interface for Cloud-Based Identity Management , 2018 .
[30] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[31] Oriana Riva,et al. Taking data exposure into account: how does it affect the choice of sign-in accounts? , 2013, CHI.
[32] Mohamed Shehab,et al. Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions , 2017, Proc. Priv. Enhancing Technol..
[33] Jens Grossklags,et al. An online experiment of privacy authorization dialogues for social applications , 2013, CSCW.
[34] Heather Richter Lipford,et al. Increasing User Attention with a Comic-based Policy , 2018, CHI.