Exploring Privacy Practices of Female mHealth Apps in a Post-Roe World
Mobile apps which support women's health have developed rapidly alongside the
increasing de-stigmatisation of female reproductive wellbeing. However, the ubiquity of …
increasing de-stigmatisation of female reproductive wellbeing. However, the ubiquity of …
{DELF}: Safeguarding deletion correctness in Online Social Networks
K Cohn-Gordon, G Damaskinos, D Neto… - 29th USENIX Security …, 2020 - usenix.org
Deletion is a core facet of Online Social Networks (OSNs). For users, deletion is a tool to
remove what they have shared and control their data. For OSNs, robust deletion is both an …
remove what they have shared and control their data. For OSNs, robust deletion is both an …
Data dashboard: exploring centralization and customization in personal data curation
The advent of cloud platforms and mobile devices has complicated personal data
management and decisions about what data to keep or discard. To explore how to help …
management and decisions about what data to keep or discard. To explore how to help …
SoK: The Gap Between Data Rights Ideals and Reality
As information economies burgeon, they unlock innovation and economic wealth while
posing novel threats to civil liberties and altering power dynamics between individuals …
posing novel threats to civil liberties and altering power dynamics between individuals …
Security and Privacy with Second-Hand Storage Devices: A User-Centric Perspective from Switzerland
KS Niksirat, D Korka, Q Jacquemin, C Vanini… - Proceedings on Privacy …, 2024 - hal.science
Second-hand electronic devices are increasingly being sold online. Although more
affordable and more environment-friendly than new products, second-hand devices, in …
affordable and more environment-friendly than new products, second-hand devices, in …
ExD: Explainable Deletion
KM Ramokapane, A Rashid - Proceedings of the 2023 New Security …, 2023 - dl.acm.org
This paper focuses on a critical yet often overlooked aspect of data in digital systems and
services—deletion. Through a review of existing literature we highlight the challenges that …
services—deletion. Through a review of existing literature we highlight the challenges that …
A Decision-Making Process to Implement the 'Right to Be Forgotten'in Machine Learning
K Hawkins, N Alhuwaish, S Belguith, A Vranaki… - Annual Privacy …, 2023 - Springer
The unprecedented scale at which personal data is used to train machine learning (ML)
models is a motivation to examine the ways in which it can be erased when implementing …
models is a motivation to examine the ways in which it can be erased when implementing …
Taken out of context: Security risks with security code autofill in ios & macos
A Gutmann, SJ Murdoch - 2019 - discovery.ucl.ac.uk
Security Code AutoFill is a new convenience feature integrated into iOS 12 and macOS
10.14, which aims to ease the use of security codes sent via SMS. We report on the first …
10.14, which aims to ease the use of security codes sent via SMS. We report on the first …
“Oops...”: Mobile Message Deletion in Conversation Error and Regret Remediation
Message deletion in mobile messaging apps allows people to “unsay” things they have said.
This paper explores how and why people use (or do not use) this feature within remediation …
This paper explores how and why people use (or do not use) this feature within remediation …
A Review of Security Threats from E-waste: Issues, Challenges, and Sustainability
Technological evolution in Information and Communication Technologies (ICT) such as
cloud networks, the Internet of Things (IoT), web-based applications, etc., has led to …
cloud networks, the Internet of Things (IoT), web-based applications, etc., has led to …