Measuring the emergence of consent management on the web
Privacy laws like the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) have pushed internet firms processing personal data to …
Consumer Privacy Act (CCPA) have pushed internet firms processing personal data to …
[HTML][HTML] (Mis) perceptions and engagement on Twitter: COVID-19 vaccine rumors on efficacy and mass immunization effort
F Sharevski, A Huff, P Jachim, E Pieroni - International Journal of …, 2022 - Elsevier
This paper reports the findings of a 606-participant study analyzing the perception of, and
engagement with, COVID-19 vaccine rumors on efficacy and mass immunization effort on …
engagement with, COVID-19 vaccine rumors on efficacy and mass immunization effort on …
Misinformation warnings: Twitter's soft moderation effects on covid-19 vaccine belief echoes
F Sharevski, R Alsaadi, P Jachim, E Pieroni - Computers & security, 2022 - Elsevier
Twitter, prompted by the rapid spread of alternative narratives, started actively warning users
about the spread of COVID-19 misinformation. This form of soft moderation comes in two …
about the spread of COVID-19 misinformation. This form of soft moderation comes in two …
Assessing Suspicious Emails with Banner Warnings Among Blind and {Low-Vision} Users in Realistic Settings
F Sharevski, A Zeidieh - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
Warning users about suspicious emails usually happens through visual interventions such
as banners. Evidence from laboratory experiments shows that email banner warnings are …
as banners. Evidence from laboratory experiments shows that email banner warnings are …
Meaningful context, a red flag, or both? preferences for enhanced misinformation warnings among us twitter users
F Sharevski, A Devine, P Jachim, E Pieroni - Proceedings of the 2022 …, 2022 - dl.acm.org
Warning users about misinformation on social media is not a simple usability task. Soft
moderation has to balance between debunking falsehoods and avoiding moderation bias …
moderation has to balance between debunking falsehoods and avoiding moderation bias …
On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security
Communication tools with end-to-end (E2E) encryption help users maintain their privacy.
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …
Towards improving the efficacy of windows security notifier for apps from unknown publishers: The role of rhetoric
With over 1.4 billion users of Windows 10, it is the most widely used operating system in the
world. In Windows, applications from unknown publishers are popular due to mass …
world. In Windows, applications from unknown publishers are popular due to mass …
Phishing with malicious QR codes
F Sharevski, A Devine, E Pieroni, P Jachim - Proceedings of the 2022 …, 2022 - dl.acm.org
The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world.
That changed overnight, as the QR codes became a convenient go-between for sharing …
That changed overnight, as the QR codes became a convenient go-between for sharing …
Misinformation warning labels: Twitter's soft moderation effects on COVID-19 vaccine belief echoes
F Sharevski, R Alsaadi, P Jachim, E Pieroni - arXiv preprint arXiv …, 2021 - arxiv.org
Twitter, prompted by the rapid spread of alternative narratives, started actively warning users
about the spread of COVID-19 misinformation. This form of soft moderation comes in two …
about the spread of COVID-19 misinformation. This form of soft moderation comes in two …
“taking out the trash”: Why security behavior change requires intentional forgetting
J Hielscher, A Kluge, U Menges… - Proceedings of the 2021 …, 2021 - dl.acm.org
Security awareness is big business–virtually every organization in the Western world
provides some form of awareness or training, mostly bought from external vendors …
provides some form of awareness or training, mostly bought from external vendors …