[HTML][HTML] Untapping the potential of mobile location data: The opportunities and challenges for retail analytics
J Aversa, A Azmy, T Hernandez - Journal of Retailing and Consumer …, 2024 - Elsevier
Smartphone technology has created a burgeoning mobile location data (MLD) marketplace.
MLD has been adopted by many retailers to track consumer behaviours at a granular level …
MLD has been adopted by many retailers to track consumer behaviours at a granular level …
Characterizing the technology needs of vulnerable populations for participation in research and design by adopting Maslow's hierarchy of needs
While various frameworks and heuristics exist within the HCI community to guide research
and design for vulnerable populations, most are centered on the researcher's involvement …
and design for vulnerable populations, most are centered on the researcher's involvement …
Evaluating the usability of privacy choice mechanisms
Privacy choice interfaces commonly take the form of cookie consent banners, advertising
choices, sharing settings, and prompts to enable location and other system services …
choices, sharing settings, and prompts to enable location and other system services …
A security enhanced android unlock scheme based on pinch-to-zoom for smart devices
W Li, T Gleerup, J Tan, Y Wang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the rapid development of information technology, mobile phones especially
smartphones have become a basic and important personal device to assist and facilitate an …
smartphones have become a basic and important personal device to assist and facilitate an …
Privacy of Default Apps in Apple's Mobile Ecosystem
A Bourdoucen, J Lindqvist - Proceedings of the CHI Conference on …, 2024 - dl.acm.org
Users need to configure default apps when they first start using their devices. The privacy
configurations of these apps do not always match what users think they have initially …
configurations of these apps do not always match what users think they have initially …
Usable Privacy and Security in Mobile Applications: Perception of Mobile End Users in Saudi Arabia
S Saeed - Big Data and Cognitive Computing, 2024 - search.proquest.com
Privacy and security is very critical for mobile users and in-depth research into the area
highlights a need for more scientific literature on the perception and challenges of end users …
highlights a need for more scientific literature on the perception and challenges of end users …
Designing Privacy-Protecting System with Visual Masking Based on Investigation of Privacy Concerns in Virtual Screen Sharing Environments
M Ishida, K Ikematsu, Y Igarashi - Proceedings of the ACM on Human …, 2024 - dl.acm.org
Virtual meeting tools, such as Zoom, can sometimes lead to inadvertently sharing private
information through screen sharing features. We conducted fundamental investigations on …
information through screen sharing features. We conducted fundamental investigations on …
Privacy Is the Price: Player Views and Technical Evaluation of Data Practices in Online Games
Online games engage players in sharing their personal data with the games themselves and
other players, which can pose security, privacy, and integrity risks to players. This paper …
other players, which can pose security, privacy, and integrity risks to players. This paper …
{ATTention} Please! An Investigation of the App Tracking Transparency Permission
Apple introduced the App Tracking Transparency (ATT) framework in iOS 14.5. The goal of
this framework is to mitigate user concerns about how their privacy-sensitive data is used for …
this framework is to mitigate user concerns about how their privacy-sensitive data is used for …
{“I} do (not) need that {Feature!”}–Understanding {Users'} Awareness and Control of Privacy Permissions on Android Smartphones
We present the results of the first field study (N= 132) investigating users'(1) awareness of
Android privacy permissions granted to installed apps and (2) control behavior over these …
Android privacy permissions granted to installed apps and (2) control behavior over these …