The ethics of advanced ai assistants

I Gabriel, A Manzini, G Keeling, LA Hendricks… - arXiv preprint arXiv …, 2024 - arxiv.org
This paper focuses on the opportunities and the ethical and societal risks posed by
advanced AI assistants. We define advanced AI assistants as artificial agents with natural …

[PDF][PDF] How WEIRD is Usable Privacy and Security Research?

AA Hasegawa, D Inoue, M Akiyama - 33rd USENIX Security Symposium, 2024 - usenix.org
In human factor fields such as human-computer interaction (HCI) and psychology,
researchers have been concerned that participants mostly come from WEIRD (Western …

A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design

M Sim, K Hugenberg, T Kohno, F Roesner - Proceedings of the 2023 …, 2023 - dl.acm.org
Research in computer security has increasingly considered the needs of marginalized and
vulnerable groups in technology. Through this work, we hope to translate this research …

Expanding Concepts of Non-Consensual Image-Disclosure Abuse: A Study of NCIDA in Pakistan

A Batool, M Naseem, K Toyama - Proceedings of the CHI Conference on …, 2024 - dl.acm.org
Non-Consensual Image-Disclosure Abuse (NCIDA) represents a subset of technology-
facilitated sexual abuse where imagery and video with romantic or sexual connotations are …

Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints

A Bhattacharya, K Lee, V Ravi, J Staddon… - Proceedings of the CHI …, 2024 - dl.acm.org
Digital financial services can introduce new digital-safety risks for users, particularly
survivors of intimate partner financial abuse (IPFA). To offer improved support for such users …

How WEIRD is Usable Privacy and Security Research?(Extended Version)

AA Hasegawa, D Inoue, M Akiyama - arXiv preprint arXiv:2305.05004, 2023 - arxiv.org
In human factor fields such as human-computer interaction (HCI) and psychology,
researchers have been concerned that participants mostly come from WEIRD (Western …

Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse

M Wei, S Consolvo, PG Kelley, T Kohno… - arXiv preprint arXiv …, 2024 - arxiv.org
Image-based sexual abuse (IBSA), like other forms of technology-facilitated abuse, is a
growing threat to people's digital safety. Attacks include unwanted solicitations for sexually …

Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR

A Sabir, A Das - arXiv preprint arXiv:2403.05499, 2024 - arxiv.org
Virtual Reality (VR) has witnessed a rising issue of harassment, prompting the integration of
safety controls like muting and blocking in VR applications. However, the lack of …

[PDF][PDF] Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR

SB Abhinaya, A Sabir, A Das - arXiv e-prints, 2024 - usenix.org
Virtual Reality (VR) has witnessed a rising issue of harassment, prompting the integration of
safety controls like muting and blocking in VR applications. However, the lack of …

Real-World Security for At-Risk Users

N Warford - 2023 - search.proquest.com
Whether due to context or circumstance,“at-risk” users experience risk factors that augment
or amplify their chances of being digitally attacked and/or suffering disproportionate harms in …