Projects per year
Abstract
User-centric digital identity initiatives are emerging with a mission to shift control over online identity disclosures to the individual. However, there is little representation of prospective users in discussions of the merits of empowering users with new data management responsibilities and the acceptability of new technologies. We conducted a user study comprising a contextual inquiry and semi-structured interviews using a prototype decentralized identity wallet app with 30 online participants. Our usability analysis uncovered misunderstandings about decentralized identifiers (DIDs) and pain points relating to using QR codes and following the signposting of cross-device user journeys. In addition, the technology did not readily resolve questions about whether the user, identity provider, or relying party was in control of data at crucial moments. We also learned that users' judgments of data minimization encompass a broader scope of issues than simply the technical provision of the identity wallet. Our results contribute to understanding future user-centric identity technologies from the view of privacy and user acceptance.
Original language | English |
---|---|
Title of host publication | Proceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022 |
Publisher | USENIX Association |
Pages | 195-211 |
Number of pages | 17 |
ISBN (Electronic) | 9781939133304 |
Publication status | Published - 2022 |
Event | 18th Symposium on Usable Privacy and Security, SOUPS 2022 - Boston, United States Duration: 7 Aug 2022 → 9 Aug 2022 |
Publication series
Name | Proceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022 |
---|
Conference
Conference | 18th Symposium on Usable Privacy and Security, SOUPS 2022 |
---|---|
Country/Territory | United States |
City | Boston |
Period | 7/08/22 → 9/08/22 |
Fingerprint
Dive into the research topics of 'An Empirical Study of a Decentralized IdentityWallet: Usability, Security, and Perspectives on User Control'. Together they form a unique fingerprint.Projects
- 1 Active
-
Cybersecurity (TPM)
van Eeten, M. J. G., Hernandez Ganan, C., Gürses, F. S., van Wegberg, R. S., Parkin, S. E., Zhauniarovich, Y., van Engelenburg, S. H., Kadenko, N. I., Labunets, K., Akyazi, U., Bouwman, X. B., Jansen, B. A., Kaur, M., Al Alsadi, A., Lone, Q. B., Turcios Rodriguez, E. R., Vermeer, M., van Harten, V. T. C., Vetrivel, S., Oomens, E. (. C. )., Kustosch, L. F., Bisogni, F., Ciere, M., Fiebig, T., Korczynski, M. T., Moreira Moura, G. C., Noroozian, A., Pieters, W., Tajalizadehkhoob, S., Dacier, B. H. A., San José Sanchez, J., Çetin, F. O. & Zannettou, S.
1/01/10 → …
Project: Research