Are privacy dashboards good for end users? Evaluating user perceptions and reactions to google's my activity

FM Farke, DG Balash, M Golla, M Dürmuth… - 30th USENIX Security …, 2021 - usenix.org
Privacy dashboards and transparency tools help users review and manage the data
collected about them online. Since 2016, Google has offered such a tool, My Activity, which …

A world full of privacy and security (mis) conceptions? Findings of a representative survey in 12 countries

F Herbert, S Becker, L Schaewitz, J Hielscher… - Proceedings of the …, 2023 - dl.acm.org
Misconceptions about digital security and privacy topics in the general public frequently lead
to insecure behavior. However, little is known about the prevalence and extent of such …

[PDF][PDF] Tales of favicons and caches: Persistent tracking in modern browsers

K Solomos, J Kristoff, C Kanich, J Polakis - Network and Distributed …, 2021 - par.nsf.gov
The privacy threats of online tracking have garnered considerable attention in recent years
from researchers and practitioners. This has resulted in users becoming more …

Away from prying eyes: Analyzing usage and understanding of private browsing

H Habib, J Colnago, V Gopalakrishnan… - … symposium on usable …, 2018 - usenix.org
Previous research has suggested that people use the private browsing mode of their web
browsers to conduct privacy-sensitive activities online, but have misconceptions about how it …

[PDF][PDF] What label should be applied to content produced by generative AI?

Z Epstein, AA Arechar, D Rand - 2023 - files.osf.io
In this paper, we help to advance the understanding of how to effectively label content
generated by AI. First, we highlight that there are two fundamentally different goals of …

Understanding users' knowledge about the privacy and security of browser extensions

A Kariryaa, GL Savino, C Stellmacher… - … symposium on usable …, 2021 - usenix.org
Browser extensions enrich users' browsing experience, eg, by blocking unwanted
advertisements on websites. To perform these functions, users must grant certain …

On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security

C Stransky, D Wermke, J Schrader, N Huaman… - … Symposium on Usable …, 2021 - usenix.org
Communication tools with end-to-end (E2E) encryption help users maintain their privacy.
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …

What Twitter knows: Characterizing ad targeting practices, user perceptions, and ad explanations through users' own Twitter data

M Wei, M Stamos, S Veys, N Reitinger… - 29th USENIX Security …, 2020 - usenix.org
Although targeted advertising has drawn significant attention from privacy researchers,
many critical empirical questions remain. In particular, only a few of the dozens of targeting …

Exploring user mental models of {End-to-End} encrypted communication tools

R Abu-Salma, EM Redmiles, B Ur, M Wei - 8th USENIX Workshop on …, 2018 - usenix.org
End-to-end (E2E) encrypted communication tools can help users keep their communications
secure from government or corporate surveillance. In this work, we conduct a quantitative …

" I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences and {Self-Perceptions}

E Rader, S Hautea, A Munasinghe - Sixteenth Symposium on Usable …, 2020 - usenix.org
Most people are unfamiliar with the kinds of inferences that platforms like Facebook and
Google can automatically associate with them, despite the existence of interfaces designed …