Exploring the needs of users for supporting privacy-protective behaviors in smart homes
In this paper, we studied people's smart home privacy-protective behaviors (SH-PPBs), to
gain a better understanding of their privacy management do's and don'ts in this context. We …
gain a better understanding of their privacy management do's and don'ts in this context. We …
Awareness, adoption, and misconceptions of web privacy tools
Privacy and security tools can help users protect themselves online. Unfortunately, people
are often unaware of such tools, and have potentially harmful misconceptions about the …
are often unaware of such tools, and have potentially harmful misconceptions about the …
Recruiting participants with programming skills: A comparison of four crowdsourcing platforms and a CS student mailing list
Reliably recruiting participants with programming skills is an ongoing challenge for empirical
studies involving software development technologies, often leading to the use of …
studies involving software development technologies, often leading to the use of …
Experimental investigation of technical and human factors related to phishing susceptibility
This article reports on a simulated phishing experiment targeting 6,938 faculty and staff at
George Mason University. The three-week phishing campaign employed three types of …
George Mason University. The three-week phishing campaign employed three types of …
Empowering resignation: There's an app for that
JS Seberger, M Llavore, NN Wyant… - Proceedings of the …, 2021 - dl.acm.org
“There's an app for that” is perhaps the definitive rhetoric of our times. To understand how
users navigate the trade-offs involved in using apps that support a variety of everyday …
users navigate the trade-offs involved in using apps that support a variety of everyday …
" Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them
Despite the prevalence of data breaches, there is a limited understanding of individuals'
awareness, perception, and responses to breaches that affect them. We provide novel …
awareness, perception, and responses to breaches that affect them. We provide novel …
" All of them claim to be the best": Multi-perspective study of {VPN} users and {VPN} providers
As more users adopt VPNs for a variety of reasons, it is important to develop empirical
knowledge of their needs and mental models of what a VPN offers. Moreover, studying VPN …
knowledge of their needs and mental models of what a VPN offers. Moreover, studying VPN …
Investigating influencer VPN ads on YouTube
One widespread, but frequently overlooked, source of security information is influencer
marketing ads on YouTube for security and privacy products such as VPNs. This paper …
marketing ads on YouTube for security and privacy products such as VPNs. This paper …
The effect of privacy regulation on the data industry: Empirical evidence from GDPR
This paper studies the effects of the EU's General Data Protection Regulation (GDPR) on the
ability of firms to collect consumer data, identify consumers over time, accrue revenue via …
ability of firms to collect consumer data, identify consumers over time, accrue revenue via …
When gamification spoils your learning: A qualitative case study of gamification misuse in a language-learning app
More and more learning apps like Duolingo are using some form of gamification (eg,
badges, points, and leaderboards) to enhance user learning. However, they are not always …
badges, points, and leaderboards) to enhance user learning. However, they are not always …