Examining the adoption and abandonment of security, privacy, and identity theft protection practices

Y Zou, K Roundy, A Tamersoy, S Shintre… - Proceedings of the …, 2020 - dl.acm.org
Users struggle to adhere to expert-recommended security and privacy practices. While prior
work has studied initial adoption of such practices, little is known about the subsequent …

" Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them

P Mayer, Y Zou, F Schaub, AJ Aviv - 30th USENIX Security Symposium …, 2021 - usenix.org
Despite the prevalence of data breaches, there is a limited understanding of individuals'
awareness, perception, and responses to breaches that affect them. We provide novel …

“There's so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment

M Wei, S Consolvo, PG Kelley, T Kohno… - Proceedings of the …, 2023 - dl.acm.org
Online hate and harassment poses a threat to the digital safety of people globally. In light of
this risk, there is a need to equip as many people as possible with advice to stay safer …

Child safety in the smart home: parents' perceptions, needs, and mitigation strategies

K Sun, Y Zou, J Radesky, C Brooks… - Proceedings of the ACM …, 2021 - dl.acm.org
Concerns about child physical and digital safety are emerging with families' adoption of
smart home technologies such as robot vacuums and smart speakers. To better understand …

Defensive technology use by political activists during the Sudanese revolution

A Daffalla, L Simko, T Kohno… - 2021 IEEE symposium …, 2021 - ieeexplore.ieee.org
Political activism is a worldwide force in geopolitical change and has, historically, helped
lead to greater justice, equality, and stopping human rights abuses. A modern revolution …

Individually vulnerable, collectively safe: The security and privacy practices of households with older adults

S Murthy, KS Bhat, S Das, N Kumar - Proceedings of the ACM on Human …, 2021 - dl.acm.org
Older adults are especially vulnerable to online cybersecurity and privacy (SP) threats, such
as phishing, ransomware, and targeted misinformation campaigns. Prior work has …

{Anti-Privacy} and {Anti-Security} Advice on {TikTok}: Case Studies of {Technology-Enabled} Surveillance and Control in Intimate Partner and {Parent-Child} …

M Wei, E Zeng, T Kohno, F Roesner - Eighteenth Symposium on Usable …, 2022 - usenix.org
Modern technologies including smartphones, AirTags, and tracking apps enable
surveillance and control in interpersonal relationships. In this work, we study videos posted …

" Did They {F*** ing} Consent to That?": Safer Digital Intimacy via Proactive Protection Against {Image-Based} Sexual Abuse

L Qin, V Hamilton, S Wang, Y Aydinalp… - 33rd USENIX Security …, 2024 - usenix.org
As many as 8 in 10 adults share intimate content such as nude or lewd images. Sharing
such content has significant benefits for relationship intimacy and body image, and can offer …

The security & privacy acceptance framework (spaf)

S Das, C Faklaris, JI Hong… - Foundations and Trends …, 2022 - nowpublishers.com
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …

Understanding the security and privacy advice given to black lives matter protesters

MJ Boyd, JL Sullivan Jr, M Chetty, B Ur - … of the 2021 CHI conference on …, 2021 - dl.acm.org
In 2020, there were widespread Black Lives Matter (BLM) protests in the US Because many
attendees were novice protesters, organizations distributed guides for staying safe at a …