Users' expectations about and use of smartphone privacy and security settings

A Frik, J Kim, JR Sanchez, J Ma - … of the 2022 CHI Conference on Human …, 2022 - dl.acm.org
With the growing smartphone penetration rate, smartphone settings remain one of the main
models for information privacy and security controls. Yet, their usability is largely …

Stuck in the permissions with you: Developer & end-user perspectives on app permissions & their privacy ramifications

M Tahaei, R Abu-Salma, A Rashid - … of the 2023 CHI Conference on …, 2023 - dl.acm.org
While the literature on permissions from the end-user perspective is rich, there is a lack of
empirical research on why developers request permissions, their conceptualization of …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Attention please: Your attention check questions in survey studies can be automatically answered

W Pei, A Mayer, K Tu, C Yue - Proceedings of The Web Conference …, 2020 - dl.acm.org
Attention check questions have become commonly used in online surveys published on
popular crowdsourcing platforms as a key mechanism to filter out inattentive respondents …

Skip, skip, skip, accept!!!: A study on the usability of smartphone manufacturer provided default features and user privacy

KM Ramokapane, AC Mazeli, A Rashid - arXiv preprint arXiv:2308.14593, 2023 - arxiv.org
Smartphone manufacturer provided default features (eg, default location services, iCloud,
Google Assistant, ad tracking) enhance the usability and extend the functionality of these …

Evaluating the impact of community oversight for managing mobile privacy and security

M Akter, M Tabassum, NS Miazi, L Alghamdi… - … Symposium on Usable …, 2023 - usenix.org
Mobile privacy and security can be a collaborative process where individuals seek advice
and help from their trusted communities. To support such collective privacy and security …

Privacy Is the Price: Player Views and Technical Evaluation of Data Practices in Online Games

A Bourdoucen, L Nurgalieva, J Lindqvist - Proceedings of the ACM on …, 2023 - dl.acm.org
Online games engage players in sharing their personal data with the games themselves and
other players, which can pose security, privacy, and integrity risks to players. This paper …

An analysis of web tracking domains in mobile applications

B Krupp, J Hadden, M Matthews - Proceedings of the 13th ACM Web …, 2021 - dl.acm.org
Modern web browsers provide users an improved awareness of how websites track them
and the potential use of data that is gathered. These features can be built into the browser or …

What users want from cloud deletion and the information they need: A participatory action study

KM Ramokapane, J Such, A Rashid - ACM Transactions on Privacy and …, 2022 - dl.acm.org
Current cloud deletion mechanisms fall short in meeting users' various deletion needs. They
assume all data is deleted the same way—data is temporally removed (or hidden) from …

[HTML][HTML] An internet of secure and private things: A service-oriented architecture

A Showail, R Tahir, MF Zaffar, MH Noor… - Computers & Security, 2022 - Elsevier
Low-cost networked IoT devices are fast becoming commonplace. From implanted medical
devices to motion-activated surveillance cameras and from driverless smart cars to voice …