TY - JOUR
T1 - A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research
AU - Distler, Verena
AU - Fassl, Matthias
AU - Habib, Hana
AU - Krombholz, Katharina
AU - Lenzini, Gabriele
AU - Lallemand, Carine
AU - Cranor, Lorrie Faith
AU - Koenig, Vincent
N1 - Publisher Copyright:
© 2021 Copyright held by the owner/author(s).
PY - 2021/12
Y1 - 2021/12
N2 - Usable privacy and security researchers have developed a variety of approaches to represent risk to research participants. To understand how these approaches are used and when each might be most appropriate, we conducted a systematic literature review of methods used in security and privacy studies with human participants. From a sample of 633 papers published at five top conferences between 2014 and 2018 that included keywords related to both security/privacy and usability, we systematically selected and analyzed 284 full-length papers that included human subjects studies. Our analysis focused on study methods; risk representation; the use of prototypes, scenarios, and educational intervention; the use of deception to simulate risk; and types of participants. We discuss benefits and shortcomings of the methods, and identify key methodological, ethical, and research challenges when representing and assessing security and privacy risk. We also provide guidelines for the reporting of user studies in security and privacy.
AB - Usable privacy and security researchers have developed a variety of approaches to represent risk to research participants. To understand how these approaches are used and when each might be most appropriate, we conducted a systematic literature review of methods used in security and privacy studies with human participants. From a sample of 633 papers published at five top conferences between 2014 and 2018 that included keywords related to both security/privacy and usability, we systematically selected and analyzed 284 full-length papers that included human subjects studies. Our analysis focused on study methods; risk representation; the use of prototypes, scenarios, and educational intervention; the use of deception to simulate risk; and types of participants. We discuss benefits and shortcomings of the methods, and identify key methodological, ethical, and research challenges when representing and assessing security and privacy risk. We also provide guidelines for the reporting of user studies in security and privacy.
KW - Human-Computer Interaction (HCI)
KW - Usable privacy and security
KW - user experience (UX) research
U2 - 10.1145/3469845
DO - 10.1145/3469845
M3 - Review Article
AN - SCOPUS:85122435457
SN - 1073-0516
VL - 28
JO - ACM Transactions on Computer-Human Interaction
JF - ACM Transactions on Computer-Human Interaction
IS - 6
M1 - 50
ER -