Assessments of a Cloud-Based Data Wallet for Personal Identity Management

Within a project developing cloud technology for identity access management, usability tests of mockups of a mobile app identity provider were conducted to assess users’ consciousness of data discl ...

[1]  Debora Shaw,et al.  Handbook of usability testing: How to plan, design, and conduct effective tests , 1996 .

[2]  Philip T. Kortum,et al.  Determining what individual SUS scores mean: adding an adjective rating scale , 2009 .

[3]  Harold Abelson,et al.  No technical understanding required: helping users make informed choices about access to their personal data , 2014, MobiQuitous.

[4]  Kirstie Hawkey,et al.  What makes users refuse web single sign-on?: an empirical investigation of OpenID , 2011, SOUPS.

[5]  Bernd Zwattendorfer,et al.  CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[6]  Joseph Bonneau,et al.  Cognitive disconnect: understanding facebook connect login permissions , 2014, COSN '14.

[7]  Mohamed Shehab,et al.  Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook , 2016, DPM/QASA@ESORICS.

[8]  Oriana Riva,et al.  Taking data exposure into account: how does it affect the choice of sign-in accounts? , 2013, CHI.

[9]  Jun Zhao,et al.  Better the Devil You Know: Exposing the Data Sharing Practices of Smartphone Apps , 2017, CHI.

[10]  Stephan Krenn,et al.  Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider , 2016, Privacy and Identity Management.

[11]  Serge Egelman,et al.  My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect , 2013, CHI.

[12]  Lujo Bauer,et al.  A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality , 2013, Digital Identity Management.

[13]  Jens Grossklags,et al.  Third-party apps on Facebook: privacy and the illusion of control , 2011, CHIMIT '11.

[14]  N. Leech,et al.  Validity and Qualitative Research: An Oxymoron? , 2007 .

[15]  Tobias Pulls,et al.  Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This? , 2016, Privacy and Identity Management.

[16]  Scott Ruoti,et al.  Authentication Melee: A Usability Analysis of Seven Web Authentication Systems , 2015, WWW.

[17]  Jens Grossklags,et al.  An online experiment of privacy authorization dialogues for social applications , 2013, CSCW.

[18]  Niklas Carlsson,et al.  Information Sharing and User Privacy in the Third-party Identity Management Landscape , 2015, CODASPY.

[19]  Blase Ur,et al.  Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption , 2015 .

[20]  Heather Richter Lipford,et al.  Users' (mis)conceptions of social applications , 2010, Graphics Interface.

[21]  J. B. Brooke,et al.  SUS: A 'Quick and Dirty' Usability Scale , 1996 .

[22]  L. Jean Camp,et al.  Comparative eye tracking of experts and novices in web single sign-on , 2013, CODASPY '13.

[23]  Mohamed Shehab,et al.  Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions , 2017, Proc. Priv. Enhancing Technol..

[24]  John Sören Pettersson,et al.  Towards the Adoption of Secure Cloud Identity Services , 2017, ARES.

[25]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..