May 2024
·
13 Reads
·
3 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
May 2024
·
13 Reads
·
3 Citations
May 2024
·
7 Reads
February 2024
·
43 Reads
Lecture Notes in Computer Science
Virtual Reality (VR) is becoming increasingly popular with its ability to offer new forms of interaction, user interface, and immersion not only for recreation but also for work, therapy, arts, or education. These new spaces need to be safeguarded by authentication similar to conventional IT systems. However, porting conventional interfaces to VR has often been found to be less than optimal as it fails to fully embrace the technology’s potential and potentially disrupt the immersive experience. This paper evaluates and compares the usability of two major authentication methods for VR: 2D Personal Identification Number (PIN) and gesture-based authentication - with 40 participants. While prior research has shown promising results in authentication security, there is a lack of studies specifically on usability in VR. Our findings indicate that the type of authentication and the user’s experience level affect usability, with gesture-based authentication having a higher usability score than a PIN and having faster authentication times. Hereby, users with less VR experience profited the most from a natural interaction mode for VR. The results suggest that developers should rather choose a native interaction mode in VR than try to port a familiar conventional interaction such as number pads for PINs.
October 2023
·
49 Reads
·
3 Citations
Proceedings of the ACM on Human-Computer Interaction
Users face security folklore in their daily lives in the form of security advice, myths, and word-of-mouth stories. Using a VPN to access the Tor network, i.e., Tor over VPN, is an interesting example of security folklore because of its inconclusive security benefits and its occurrence in pop-culture media. Following the Theory of Reasoned Action, we investigated the phenomenon with three studies: (1) we quantified the behavior on real-world Tor traffic and measured a prevalence of 6.23%; (2) we surveyed users' intentions and beliefs, discovering that they try to protect themselves from the Tor network or increase their general security; and (3) we analyzed online information sources, suggesting that perceived norms and ease-of-use play a significant role while behavioral beliefs about the purpose and effect are less crucial in spreading security folklore. We discuss how to communicate security advice effectively and combat security misinformation and misconceptions.
May 2023
·
6 Reads
·
1 Citation
... Regardless of the identity and trust model, organisations may use digital wallets or hardware security modules as a part of their Information System (IS) to store their identity's certificates and key material, with policies defining access rights [12]. Proprietary solutions like OpenID [2] control internal authorisation, determining who can initiate cross-organisational data exchange on behalf of ODI. ...
May 2023
... Researchers have noted users adopting VPNs to increase security & privacy while on public networks, as well as to prevent hacks or password leaks [27]. Researchers have found that roughly 6% of Tor users use VPNs in conjunction, potentially indicating the influence of popular media [28]. While using VPNs to access Tor might provide benefits under narrow threat models (e.g., preferring the ISP to know a VPN connection is happening instead of Tor, the VPN is trustable), in many cases it provides no benefits and, depending on the trustworthiness of VPN [29][30][31], may even harm privacy [28]. ...
October 2023
Proceedings of the ACM on Human-Computer Interaction