The ethics of advanced ai assistants
This paper focuses on the opportunities and the ethical and societal risks posed by
advanced AI assistants. We define advanced AI assistants as artificial agents with natural …
advanced AI assistants. We define advanced AI assistants as artificial agents with natural …
[PDF][PDF] How WEIRD is Usable Privacy and Security Research?
AA Hasegawa, D Inoue, M Akiyama - 33rd USENIX Security Symposium, 2024 - usenix.org
In human factor fields such as human-computer interaction (HCI) and psychology,
researchers have been concerned that participants mostly come from WEIRD (Western …
researchers have been concerned that participants mostly come from WEIRD (Western …
A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design
Research in computer security has increasingly considered the needs of marginalized and
vulnerable groups in technology. Through this work, we hope to translate this research …
vulnerable groups in technology. Through this work, we hope to translate this research …
Expanding Concepts of Non-Consensual Image-Disclosure Abuse: A Study of NCIDA in Pakistan
Non-Consensual Image-Disclosure Abuse (NCIDA) represents a subset of technology-
facilitated sexual abuse where imagery and video with romantic or sexual connotations are …
facilitated sexual abuse where imagery and video with romantic or sexual connotations are …
Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints
Digital financial services can introduce new digital-safety risks for users, particularly
survivors of intimate partner financial abuse (IPFA). To offer improved support for such users …
survivors of intimate partner financial abuse (IPFA). To offer improved support for such users …
How WEIRD is Usable Privacy and Security Research?(Extended Version)
AA Hasegawa, D Inoue, M Akiyama - arXiv preprint arXiv:2305.05004, 2023 - arxiv.org
In human factor fields such as human-computer interaction (HCI) and psychology,
researchers have been concerned that participants mostly come from WEIRD (Western …
researchers have been concerned that participants mostly come from WEIRD (Western …
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse
Image-based sexual abuse (IBSA), like other forms of technology-facilitated abuse, is a
growing threat to people's digital safety. Attacks include unwanted solicitations for sexually …
growing threat to people's digital safety. Attacks include unwanted solicitations for sexually …
Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR
A Sabir, A Das - arXiv preprint arXiv:2403.05499, 2024 - arxiv.org
Virtual Reality (VR) has witnessed a rising issue of harassment, prompting the integration of
safety controls like muting and blocking in VR applications. However, the lack of …
safety controls like muting and blocking in VR applications. However, the lack of …
[PDF][PDF] Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR
SB Abhinaya, A Sabir, A Das - arXiv e-prints, 2024 - usenix.org
Virtual Reality (VR) has witnessed a rising issue of harassment, prompting the integration of
safety controls like muting and blocking in VR applications. However, the lack of …
safety controls like muting and blocking in VR applications. However, the lack of …
Real-World Security for At-Risk Users
N Warford - 2023 - search.proquest.com
Whether due to context or circumstance,“at-risk” users experience risk factors that augment
or amplify their chances of being digitally attacked and/or suffering disproportionate harms in …
or amplify their chances of being digitally attacked and/or suffering disproportionate harms in …