A Systematic Analysis of User Evaluations in Security Research

被引:2
作者
Hamm, Peter [1 ]
Harborth, David [1 ]
Pape, Sebastian [1 ]
机构
[1] Goethe Univ Frankfurt, Frankfurt, Germany
来源
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019) | 2019年
关键词
systematic literature review; qualitative methods; quantitative methods; user evaluations; human aspects of security; PERMISSIONS;
D O I
10.1145/3339252.3340339
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We conducted a literature survey on reproducibility and replicability of user surveys in security research. For that purpose, we examined all papers published over the last five years at three leading security research conferences and recorded the type of study and whether the authors made the underlying responses available as open data, as well as if they published the used questionnaire respectively interview guide. We uncovered how user surveys become more widespread in security research and how authors and conferences are increasingly publishing their methodologies, while we had no examples of data being made available. Based on these findings, we recommend that future researchers publish their data in addition to their results to facilitate replication and ensure a firm basis for user studies in security research.
引用
收藏
页数:7
相关论文
共 82 条
[1]   Estimating the reproducibility of psychological science [J].
Aarts, Alexander A. ;
Anderson, Joanna E. ;
Anderson, Christopher J. ;
Attridge, Peter R. ;
Attwood, Angela ;
Axt, Jordan ;
Babel, Molly ;
Bahnik, Stepan ;
Baranski, Erica ;
Barnett-Cowan, Michael ;
Bartmess, Elizabeth ;
Beer, Jennifer ;
Bell, Raoul ;
Bentley, Heather ;
Beyan, Leah ;
Binion, Grace ;
Borsboom, Denny ;
Bosch, Annick ;
Bosco, Frank A. ;
Bowman, Sara D. ;
Brandt, Mark J. ;
Braswell, Erin ;
Brohmer, Hilmar ;
Brown, Benjamin T. ;
Brown, Kristina ;
Bruening, Jovita ;
Calhoun-Sauls, Ann ;
Callahan, Shannon P. ;
Chagnon, Elizabeth ;
Chandler, Jesse ;
Chartier, Christopher R. ;
Cheung, Felix ;
Christopherson, Cody D. ;
Cillessen, Linda ;
Clay, Russ ;
Cleary, Hayley ;
Cloud, Mark D. ;
Cohn, Michael ;
Cohoon, Johanna ;
Columbus, Simon ;
Cordes, Andreas ;
Costantini, Giulio ;
Alvarez, Leslie D. Cramblet ;
Cremata, Ed ;
Crusius, Jan ;
DeCoster, Jamie ;
DeGaetano, Michelle A. ;
Della Penna, Nicolas ;
den Bezemer, Bobby ;
Deserno, Marie K. .
SCIENCE, 2015, 349 (6251)
[2]   Obstacles to the Adoption of Secure Communication Tools [J].
Abu-Salma, Ruba ;
Sasse, M. Angela ;
Bonneau, Joseph ;
Danilova, Anastasia ;
Naiakshina, Alena ;
Smith, Matthew .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :137-153
[3]   Comparing the Usability of Cryptographic APIs [J].
Acar, Yasemin ;
Backes, Michael ;
Fahl, Sascha ;
Garfinkel, Simson ;
Kim, Doowon ;
Mazurek, Michelle L. ;
Stransky, Christian .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :154-171
[4]   You Get Where You're Looking For The Impact of Information Sources on Code Security [J].
Acar, Yasemin ;
Backes, Michael ;
Fahl, Sascha ;
Kim, Doowon ;
Mazurek, Michelle L. ;
Stransky, Christian .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :289-305
[5]  
Association for Computing Machinery, 2016, ART REV BADG
[6]  
Baker Monya, 2016, 1 500 SCI LIFT LID R
[7]  
Becker I, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P239
[8]  
Berg Jeremy, 2018, PROGR REPRODUCIBILIT
[9]   What the App is That? Deception and Countermeasures in the Android User Interface [J].
Bianchi, Antonio ;
Corbetta, Jacopo ;
Invernizzi, Luca ;
Fratantonio, Yanick ;
Kruegel, Christopher ;
Vigna, Giovanni .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :931-948
[10]  
Bonneau J, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P607