A Systematic Analysis of User Evaluations in Security Research

被引:2
作者
Hamm, Peter [1 ]
Harborth, David [1 ]
Pape, Sebastian [1 ]
机构
[1] Goethe Univ Frankfurt, Frankfurt, Germany
来源
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019) | 2019年
关键词
systematic literature review; qualitative methods; quantitative methods; user evaluations; human aspects of security; PERMISSIONS;
D O I
10.1145/3339252.3340339
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We conducted a literature survey on reproducibility and replicability of user surveys in security research. For that purpose, we examined all papers published over the last five years at three leading security research conferences and recorded the type of study and whether the authors made the underlying responses available as open data, as well as if they published the used questionnaire respectively interview guide. We uncovered how user surveys become more widespread in security research and how authors and conferences are increasingly publishing their methodologies, while we had no examples of data being made available. Based on these findings, we recommend that future researchers publish their data in addition to their results to facilitate replication and ensure a firm basis for user studies in security research.
引用
收藏
页数:7
相关论文
共 82 条
[71]  
Tian Y, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P361
[72]   Users Really Do Plug in USB Drives They Find [J].
Tischer, Matthew ;
Durumeric, Zakir ;
Foster, Sam ;
Duan, Sunny ;
Mori, Alec ;
Bursztein, Elie ;
Bailey, Michael .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :306-319
[73]   SURROUNDWEB: Mitigating Privacy Concerns in a 3D Web Browser [J].
Vilk, John ;
Molnar, David ;
Livshits, Benjamin ;
Ofek, Eyal ;
Rossbach, Chris ;
Moshchuk, Alexander ;
Wang, Helen J. ;
Gal, Ran .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :431-446
[74]  
Vom BrockeJ., 2009, ECIS, P2206
[75]   Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes [J].
Votipka, Daniel ;
Stevens, Rock ;
Redmiles, Elissa M. ;
Hu, Jeremy ;
Mazurek, Michelle L. .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :374-391
[76]  
Webster J, 2002, MIS QUART, V26, pXIII
[77]   The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences [J].
Wijesekera, Primal ;
Baokar, Arjun ;
Tsai, Lynn ;
Reardon, Joel ;
Egelman, Serge ;
Wagner, David ;
Beznosov, Konstantin .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :1077-1093
[78]  
Wijesekera P, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P499
[79]  
Winter P, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P411
[80]  
Yuan XJ, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P49