Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness
A Soumelidou, A Tsohou - Telematics and Informatics, 2021 - Elsevier
In today's Internet reliant services, the issue of users' information privacy awareness is being
raised. Despite the fact that in many cases internet users claim to be cognizant of privacy …
raised. Despite the fact that in many cases internet users claim to be cognizant of privacy …
Becoming a blockchain user: understanding consumers' benefits realisation to use blockchain-based applications
Data breaches and cyber incidents are on the rise, and companies continually research new
technologies to defend against attacks and protect customer data. The blockchain is a data …
technologies to defend against attacks and protect customer data. The blockchain is a data …
Investigating tangible privacy-preserving mechanisms for future smart homes
Most smart home devices have multiple sensors, such as cameras and microphones;
however, most cannot be controlled individually. Tangible privacy mechanisms provide …
however, most cannot be controlled individually. Tangible privacy mechanisms provide …
Informing the design of privacy-empowering tools for the connected home
Connected devices in the home represent a potentially grave new privacy threat due to their
unfettered access to the most personal spaces in people's lives. Prior work has shown that …
unfettered access to the most personal spaces in people's lives. Prior work has shown that …
Tracking on the Web, Mobile and the Internet of Things
R Binns - Foundations and Trends® in Web Science, 2022 - nowpublishers.com
Abstract “Tracking” is the collection of data about an individual's activity across multiple
distinct contexts and the retention, use, or sharing of data derived from that activity outside …
distinct contexts and the retention, use, or sharing of data derived from that activity outside …
Investigating how users imagine their personal privacy assistant
A Stöver, S Hahn, F Kretschmer… - Proceedings on Privacy …, 2023 - petsymposium.org
Personal Privacy Assistants (PPAs) can support users in managing their privacy. Conducting
a user study, we provide qualitative and quantitative insights into how users imagine their …
a user study, we provide qualitative and quantitative insights into how users imagine their …
On the challenges of developing a concise questionnaire to identify privacy personas
Concise instruments to determine privacy personas–typical privacy-related user groups–are
not available at present. Consequently, we aimed to identify them on a privacy knowledge …
not available at present. Consequently, we aimed to identify them on a privacy knowledge …
“It's time. Time for digital security.”: An End User Study on Actionable Security and Privacy Advice
Digital security advice is the focus of much research, with unsatisfying results: End users do
not follow experts' security advice, and users and experts struggle to prioritize existing …
not follow experts' security advice, and users and experts struggle to prioritize existing …
Understanding and mitigating technology-facilitated privacy violations in the physical world
We are constantly surrounded by technology that collects and processes sensitive data,
paving the way for privacy violations. Yet, current research investigating technology …
paving the way for privacy violations. Yet, current research investigating technology …
Taiwanese University Students' Smartphone Use and the Privacy Paradox.
YNK Chen, CHR Wen - Comunicar: Media Education Research Journal, 2019 - ERIC
With the prevalence of smart devices and wireless Internet, privacy has become a pivotal
matter in governmental, academic, and technological fields. Our study aims to understand …
matter in governmental, academic, and technological fields. Our study aims to understand …