How can and would people protect from online tracking?
M Mehrnezhad… - Proceedings on …, 2021 - durham-repository.worktribe.com
Online tracking is complex and users find itchallenging to protect themselves from it. While
the aca-demic community has extensively studied systems andusers for tracking practices …
the aca-demic community has extensively studied systems andusers for tracking practices …
Usage patterns of privacy-enhancing technologies
KPL Coopamootoo - Proceedings of the 2020 ACM SIGSAC Conference …, 2020 - dl.acm.org
The steady reports of privacy invasions online paints a picture of the Internet growing into a
more dangerous place. This is supported by reports of the potential scale for online harms …
more dangerous place. This is supported by reports of the potential scale for online harms …
Out-of-device privacy unveiled: Designing and validating the out-of-device privacy scale (odps)
This paper proposes an Out-of-Device Privacy Scale (ODPS)-a reliable, validated
psychometric privacy scale that measures users' importance of out-of-device privacy. In …
psychometric privacy scale that measures users' importance of out-of-device privacy. In …
Users' privacy attitudes towards the use of behavioral biometrics continuous authentication (BBCA) technologies: A protection motivation theory approach
Smartphone user authentication based on passwords, PINs, and touch patterns raises
several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) …
several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) …
Living is easy with eyes closed: Avoidance of targeted political advertising in response to privacy concerns, perceived personalization, and overload
M Stubenvoll, A Binder, S Noetzel… - Communication …, 2024 - journals.sagepub.com
Political parties increasingly rely on sophisticated targeting strategies to persuade potential
voters. However, questions have been raised about the effectiveness of targeted political …
voters. However, questions have been raised about the effectiveness of targeted political …
Understanding and mitigating technology-facilitated privacy violations in the physical world
We are constantly surrounded by technology that collects and processes sensitive data,
paving the way for privacy violations. Yet, current research investigating technology …
paving the way for privacy violations. Yet, current research investigating technology …
[PDF][PDF] Achieving usable security and privacy through Human-Centered Design
Scope and Motivation Numerous examples show that cybersecurity and data protection
measures need to be designed in such a way that end users can interact safely with digital …
measures need to be designed in such a way that end users can interact safely with digital …
[PDF][PDF] Barriers to the Practical Adoption of Federated Machine Learning in Cross-company Collaborations.
Research in federated machine learning and privacy-enhancing technologies has spiked
recently. These technologies could enable cross-company collaboration, which yields the …
recently. These technologies could enable cross-company collaboration, which yields the …
The Role of Privacy Guarantees in Voluntary Donation of Private Data for Altruistic Goals
Voluntary donation of private information for altruistic purposes, such as advancing
research, is common. However, concerns about data misuse and leakage may deter …
research, is common. However, concerns about data misuse and leakage may deter …
Exploring mental models of the right to informational self-determination of office workers in Germany
J Tolsdorf, F Dehling, D Reinhardt… - Proceedings on Privacy …, 2021 - petsymposium.org
Applied privacy research has so far focused mainly on consumer relations in private life.
Privacy in the context of employment relationships is less well studied, although it is subject …
Privacy in the context of employment relationships is less well studied, although it is subject …