How can and would people protect from online tracking?

M Mehrnezhad… - Proceedings on …, 2021 - durham-repository.worktribe.com
Online tracking is complex and users find itchallenging to protect themselves from it. While
the aca-demic community has extensively studied systems andusers for tracking practices …

Usage patterns of privacy-enhancing technologies

KPL Coopamootoo - Proceedings of the 2020 ACM SIGSAC Conference …, 2020 - dl.acm.org
The steady reports of privacy invasions online paints a picture of the Internet growing into a
more dangerous place. This is supported by reports of the potential scale for online harms …

Out-of-device privacy unveiled: Designing and validating the out-of-device privacy scale (odps)

H Farzand, K Marky, M Khamis - Proceedings of the CHI Conference on …, 2024 - dl.acm.org
This paper proposes an Out-of-Device Privacy Scale (ODPS)-a reliable, validated
psychometric privacy scale that measures users' importance of out-of-device privacy. In …

Users' privacy attitudes towards the use of behavioral biometrics continuous authentication (BBCA) technologies: A protection motivation theory approach

A Skalkos, I Stylios, M Karyda, S Kokolakis - Journal of Cybersecurity and …, 2021 - mdpi.com
Smartphone user authentication based on passwords, PINs, and touch patterns raises
several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) …

Living is easy with eyes closed: Avoidance of targeted political advertising in response to privacy concerns, perceived personalization, and overload

M Stubenvoll, A Binder, S Noetzel… - Communication …, 2024 - journals.sagepub.com
Political parties increasingly rely on sophisticated targeting strategies to persuade potential
voters. However, questions have been raised about the effectiveness of targeted political …

Understanding and mitigating technology-facilitated privacy violations in the physical world

M Windl, V Winterhalter, A Schmidt… - Proceedings of the 2023 …, 2023 - dl.acm.org
We are constantly surrounded by technology that collects and processes sensitive data,
paving the way for privacy violations. Yet, current research investigating technology …

[PDF][PDF] Achieving usable security and privacy through Human-Centered Design

EC Groen, D Feth, S Polst, J Tolsdorf… - Human Factors in …, 2023 - library.oapen.org
Scope and Motivation Numerous examples show that cybersecurity and data protection
measures need to be designed in such a way that end users can interact safely with digital …

[PDF][PDF] Barriers to the Practical Adoption of Federated Machine Learning in Cross-company Collaborations.

T Müller, N Gärtner, N Verzano, F Matthes - ICAART (3), 2022 - scitepress.org
Research in federated machine learning and privacy-enhancing technologies has spiked
recently. These technologies could enable cross-company collaboration, which yields the …

The Role of Privacy Guarantees in Voluntary Donation of Private Data for Altruistic Goals

R Wang, R De Viti, A Dubey, EM Redmiles - arXiv preprint arXiv …, 2024 - arxiv.org
Voluntary donation of private information for altruistic purposes, such as advancing
research, is common. However, concerns about data misuse and leakage may deter …

Exploring mental models of the right to informational self-determination of office workers in Germany

J Tolsdorf, F Dehling, D Reinhardt… - Proceedings on Privacy …, 2021 - petsymposium.org
Applied privacy research has so far focused mainly on consumer relations in private life.
Privacy in the context of employment relationships is less well studied, although it is subject …