Vision: too little too late? do the risks of femtech already outweigh the benefits?

M Mehrnezhad, L Shipp, T Almeida… - Proceedings of the 2022 …, 2022 - dl.acm.org
Female-oriented technologies (FemTech) promise to enable women to take control of their
bodies and lives, helping them overcome the many existing challenges in medical care and …

Less is not more: Improving findability and actionability of privacy controls for online behavioral advertising

J Im, R Wang, W Lyu, N Cook, H Habib… - Proceedings of the …, 2023 - dl.acm.org
Tech companies that rely on ads for business argue that users have control over their data
via ad privacy settings. However, these ad settings are often hidden. This work aims to …

“My sex-related data is more sensitive than my financial data and I want the same level of security and privacy\": User Risk Perceptions and Protective Actions in …

M Mehrnezhad, T Almeida - … of the 2023 European Symposium on …, 2023 - dl.acm.org
The digitalization of the reproductive body has engaged myriads of cutting-edge
technologies in supporting people to know and tackle their intimate health. Generally …

{ATTention} Please! An Investigation of the App Tracking Transparency Permission

R Mohamed, A Arunasalam, H Farrukh, J Tong… - 33rd USENIX Security …, 2024 - usenix.org
Apple introduced the App Tracking Transparency (ATT) framework in iOS 14.5. The goal of
this framework is to mitigate user concerns about how their privacy-sensitive data is used for …

Privacy of Default Apps in Apple's Mobile Ecosystem

A Bourdoucen, J Lindqvist - Proceedings of the CHI Conference on …, 2024 - dl.acm.org
Users need to configure default apps when they first start using their devices. The privacy
configurations of these apps do not always match what users think they have initially …

Defining" Broken": User Experiences and Remediation Tactics When {Ad-Blocking} or {Tracking-Protection} Tools Break a {Website's} User Experience

A Nisenoff, A Borem, M Pickering, G Nakanishi… - 32nd USENIX Security …, 2023 - usenix.org
To counteract the ads and third-party tracking ubiquitous on the web, users turn to blocking
tools—ad-blocking and tracking-protection browser extensions and built-in features …

Tracking the evolution of cookie-based tracking on facebook

Y Dimova, G Franken, V Le Pochat, W Joosen… - Proceedings of the 21st …, 2022 - dl.acm.org
We analyze in depth and longitudinally how Facebook's cookie-based tracking behavior and
its communication about tracking have evolved from 2015 to 2022. More stringent …

Mind the FemTech gap: regulation failings and exploitative systems

M Mehrnezhad, T Van Der Merwe… - Frontiers in The Internet of …, 2024 - frontiersin.org
The security, privacy, and safety issues around Female-oriented technologies (FemTech)
and data can lead to differential harms. These complex risks and harms are enabled by …

Invisible, Unreadable, and Inaudible Cookie Notices: An Evaluation of Cookie Notices for Users with Visual Impairments

JM Clarke, M Mehrnezhad, E Toreini - ACM Transactions on Accessible …, 2024 - dl.acm.org
This article investigates the accessibility of cookie notices on websites for users with visual
impairments (VI) via a set of system studies on top UK websites (n= 46) and a user study (n …

Of Mothers and Managers–The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field

N Gerber, A Stöver, P Mayer - … on Usable Privacy and Security (SOUPS …, 2024 - usenix.org
Gender imbalances are prevalent in computer science and the security and privacy (S&P)
field in particular, giving rise to gender stereotypes. The existence of such stereotypes might …