Exploring Privacy Practices of Female mHealth Apps in a Post-Roe World

LM Malki, I Kaleva, D Patel, M Warner… - Proceedings of the CHI …, 2024 - dl.acm.org
Mobile apps which support women's health have developed rapidly alongside the
increasing de-stigmatisation of female reproductive wellbeing. However, the ubiquity of …

{DELF}: Safeguarding deletion correctness in Online Social Networks

K Cohn-Gordon, G Damaskinos, D Neto… - 29th USENIX Security …, 2020 - usenix.org
Deletion is a core facet of Online Social Networks (OSNs). For users, deletion is a tool to
remove what they have shared and control their data. For OSNs, robust deletion is both an …

Data dashboard: exploring centralization and customization in personal data curation

F Vitale, J Chen, W Odom, J McGrenere - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
The advent of cloud platforms and mobile devices has complicated personal data
management and decisions about what data to keep or discard. To explore how to help …

SoK: The Gap Between Data Rights Ideals and Reality

Y Kwon, E Corren, GM Garrido, C Hoofnagle… - arXiv preprint arXiv …, 2023 - arxiv.org
As information economies burgeon, they unlock innovation and economic wealth while
posing novel threats to civil liberties and altering power dynamics between individuals …

Security and Privacy with Second-Hand Storage Devices: A User-Centric Perspective from Switzerland

KS Niksirat, D Korka, Q Jacquemin, C Vanini… - Proceedings on Privacy …, 2024 - hal.science
Second-hand electronic devices are increasingly being sold online. Although more
affordable and more environment-friendly than new products, second-hand devices, in …

ExD: Explainable Deletion

KM Ramokapane, A Rashid - Proceedings of the 2023 New Security …, 2023 - dl.acm.org
This paper focuses on a critical yet often overlooked aspect of data in digital systems and
services—deletion. Through a review of existing literature we highlight the challenges that …

A Decision-Making Process to Implement the 'Right to Be Forgotten'in Machine Learning

K Hawkins, N Alhuwaish, S Belguith, A Vranaki… - Annual Privacy …, 2023 - Springer
The unprecedented scale at which personal data is used to train machine learning (ML)
models is a motivation to examine the ways in which it can be erased when implementing …

Taken out of context: Security risks with security code autofill in ios & macos

A Gutmann, SJ Murdoch - 2019 - discovery.ucl.ac.uk
Security Code AutoFill is a new convenience feature integrated into iOS 12 and macOS
10.14, which aims to ease the use of security codes sent via SMS. We report on the first …

“Oops...”: Mobile Message Deletion in Conversation Error and Regret Remediation

M Warner, L Lascau, AL Cox, DP Brumby… - Proceedings of the …, 2021 - dl.acm.org
Message deletion in mobile messaging apps allows people to “unsay” things they have said.
This paper explores how and why people use (or do not use) this feature within remediation …

A Review of Security Threats from E-waste: Issues, Challenges, and Sustainability

S Das, AKMS Hosain, B Debnath - Development in E-waste …, 2023 - taylorfrancis.com
Technological evolution in Information and Communication Technologies (ICT) such as
cloud networks, the Internet of Things (IoT), web-based applications, etc., has led to …