Exploring the needs of users for supporting privacy-protective behaviors in smart homes

H Jin, B Guo, R Roychoudhury, Y Yao… - Proceedings of the …, 2022 - dl.acm.org
In this paper, we studied people's smart home privacy-protective behaviors (SH-PPBs), to
gain a better understanding of their privacy management do's and don'ts in this context. We …

Awareness, adoption, and misconceptions of web privacy tools

P Story, D Smullen, Y Yao, A Acquisti… - Proceedings on …, 2021 - petsymposium.org
Privacy and security tools can help users protect themselves online. Unfortunately, people
are often unaware of such tools, and have potentially harmful misconceptions about the …

Recruiting participants with programming skills: A comparison of four crowdsourcing platforms and a CS student mailing list

M Tahaei, K Vaniea - Proceedings of the 2022 CHI Conference on …, 2022 - dl.acm.org
Reliably recruiting participants with programming skills is an ongoing challenge for empirical
studies involving software development technologies, often leading to the use of …

Experimental investigation of technical and human factors related to phishing susceptibility

FL Greitzer, W Li, KB Laskey, J Lee, J Purl - ACM Transactions on Social …, 2021 - dl.acm.org
This article reports on a simulated phishing experiment targeting 6,938 faculty and staff at
George Mason University. The three-week phishing campaign employed three types of …

Empowering resignation: There's an app for that

JS Seberger, M Llavore, NN Wyant… - Proceedings of the …, 2021 - dl.acm.org
“There's an app for that” is perhaps the definitive rhetoric of our times. To understand how
users navigate the trade-offs involved in using apps that support a variety of everyday …

" Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them

P Mayer, Y Zou, F Schaub, AJ Aviv - 30th USENIX Security Symposium …, 2021 - usenix.org
Despite the prevalence of data breaches, there is a limited understanding of individuals'
awareness, perception, and responses to breaches that affect them. We provide novel …

" All of them claim to be the best": Multi-perspective study of {VPN} users and {VPN} providers

R Ramesh, A Vyas, R Ensafi - 32nd USENIX Security Symposium …, 2023 - usenix.org
As more users adopt VPNs for a variety of reasons, it is important to develop empirical
knowledge of their needs and mental models of what a VPN offers. Moreover, studying VPN …

Investigating influencer VPN ads on YouTube

O Akgul, R Roberts, M Namara, D Levin… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
One widespread, but frequently overlooked, source of security information is influencer
marketing ads on YouTube for security and privacy products such as VPNs. This paper …

The effect of privacy regulation on the data industry: Empirical evidence from GDPR

G Aridor, YK Che, T Salz - Proceedings of the 22nd ACM Conference on …, 2021 - dl.acm.org
This paper studies the effects of the EU's General Data Protection Regulation (GDPR) on the
ability of firms to collect consumer data, identify consumers over time, accrue revenue via …

When gamification spoils your learning: A qualitative case study of gamification misuse in a language-learning app

R Hadi Mogavi, B Guo, Y Zhang, EU Haq… - Proceedings of the …, 2022 - dl.acm.org
More and more learning apps like Duolingo are using some form of gamification (eg,
badges, points, and leaderboards) to enhance user learning. However, they are not always …