1/7/2024 0 Comments Panic mode hacked![]() We discuss benefits and shortcomings of the methods, and identify key methodological, ethical, and research challenges when representing and assessing security and privacy risk. Our analysis focused on study methods risk representation the use of prototypes, scenarios, and educational intervention the use of deception to simulate risk and types of participants. From a sample of 633 papers published at five top conferences between 20 that included keywords related to both security/privacy and usability, we systematically selected and analyzed 284 full-length papers that included human subjects studies. To understand how these approaches are used and when each might be most appropriate, we conducted a systematic literature review of methods used in security and privacy studies with human participants. Usable privacy and security researchers have developed a variety of approaches to represent risk to research participants. CS students are the most cost-effective recruitment channel and rate themselves lower than crowdsourcing participants in terms of secure development self-efficacy. ![]() ![]() We find that 27% of crowdsourcing participants, 40% of self-reported developers from crowdsourcing participants, and 89% of CS students got all programming skill questions correct. We recruited 613 participants who claimed to have programming skills and assessed recruitment channels in regards to costs, quality, programming skills, and privacy/security attitudes. In this work, we use five existing survey instruments to explore the programming skills, privacy and security attitudes, and secure development self-efficacy of CS student participants and participants from four crowdsourc-ing platforms (Appen, Clickworker, MTurk, and Prolific). Reliably recruiting participants who have programming skills is an ongoing challenge for empirical studies involving software development technologies, often leading to the use of crowdsourcing platforms and computer science (CS) students.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |