Examining the adoption and abandonment of security, privacy, and identity theft protection practices
Users struggle to adhere to expert-recommended security and privacy practices. While prior
work has studied initial adoption of such practices, little is known about the subsequent …
work has studied initial adoption of such practices, little is known about the subsequent …
" Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them
Despite the prevalence of data breaches, there is a limited understanding of individuals'
awareness, perception, and responses to breaches that affect them. We provide novel …
awareness, perception, and responses to breaches that affect them. We provide novel …
“There's so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment
Online hate and harassment poses a threat to the digital safety of people globally. In light of
this risk, there is a need to equip as many people as possible with advice to stay safer …
this risk, there is a need to equip as many people as possible with advice to stay safer …
Child safety in the smart home: parents' perceptions, needs, and mitigation strategies
Concerns about child physical and digital safety are emerging with families' adoption of
smart home technologies such as robot vacuums and smart speakers. To better understand …
smart home technologies such as robot vacuums and smart speakers. To better understand …
Defensive technology use by political activists during the Sudanese revolution
Political activism is a worldwide force in geopolitical change and has, historically, helped
lead to greater justice, equality, and stopping human rights abuses. A modern revolution …
lead to greater justice, equality, and stopping human rights abuses. A modern revolution …
Individually vulnerable, collectively safe: The security and privacy practices of households with older adults
Older adults are especially vulnerable to online cybersecurity and privacy (SP) threats, such
as phishing, ransomware, and targeted misinformation campaigns. Prior work has …
as phishing, ransomware, and targeted misinformation campaigns. Prior work has …
{Anti-Privacy} and {Anti-Security} Advice on {TikTok}: Case Studies of {Technology-Enabled} Surveillance and Control in Intimate Partner and {Parent-Child} …
Modern technologies including smartphones, AirTags, and tracking apps enable
surveillance and control in interpersonal relationships. In this work, we study videos posted …
surveillance and control in interpersonal relationships. In this work, we study videos posted …
" Did They {F*** ing} Consent to That?": Safer Digital Intimacy via Proactive Protection Against {Image-Based} Sexual Abuse
L Qin, V Hamilton, S Wang, Y Aydinalp… - 33rd USENIX Security …, 2024 - usenix.org
As many as 8 in 10 adults share intimate content such as nude or lewd images. Sharing
such content has significant benefits for relationship intimacy and body image, and can offer …
such content has significant benefits for relationship intimacy and body image, and can offer …
The security & privacy acceptance framework (spaf)
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
Understanding the security and privacy advice given to black lives matter protesters
In 2020, there were widespread Black Lives Matter (BLM) protests in the US Because many
attendees were novice protesters, organizations distributed guides for staying safe at a …
attendees were novice protesters, organizations distributed guides for staying safe at a …