What demographic attributes do our digital footprints reveal? A systematic review
J Hinds, AN Joinson - PloS one, 2018 - journals.plos.org
To what extent does our online activity reveal who we are? Recent research has
demonstrated that the digital traces left by individuals as they browse and interact with …
demonstrated that the digital traces left by individuals as they browse and interact with …
Recon: Revealing and controlling pii leaks in mobile network traffic
It is well known that apps running on mobile devices extensively track and leak users'
personally identifiable information (PII); however, these users have little visibility into PII …
personally identifiable information (PII); however, these users have little visibility into PII …
The cracked cookie jar: HTTP cookie hijacking and the exposure of private information
S Sivakorn, I Polakis… - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
The widespread demand for online privacy, also fueled by widely-publicized demonstrations
of session hijacking attacks against popular websites, has spearheaded the increasing …
of session hijacking attacks against popular websites, has spearheaded the increasing …
The long-standing privacy debate: Mobile websites vs mobile apps
EP Papadopoulos, M Diamantaris… - Proceedings of the 26th …, 2017 - dl.acm.org
The vast majority of online services nowadays, provide both a mobile friendly website and a
mobile application to their users. Both of these choices are usually released for free, with …
mobile application to their users. Both of these choices are usually released for free, with …
Why are they collecting my data? inferring the purposes of network traffic in mobile apps
Many smartphone apps collect potentially sensitive personal data and send it to cloud
servers. However, most mobile users have a poor understanding of why their data is being …
servers. However, most mobile users have a poor understanding of why their data is being …
Is the web ready for OCSP must-staple?
T Chung, J Lok, B Chandrasekaran… - Proceedings of the …, 2018 - dl.acm.org
TLS, the de facto standard protocol for securing communications over the Internet, relies on
a hierarchy of certificates that bind names to public keys. Naturally, ensuring that the …
a hierarchy of certificates that bind names to public keys. Naturally, ensuring that the …
Spaces and traces: Implications of smart technology in public housing
Smart home technologies are beginning to become more widespread and common, even as
their deployment and implementation remain complex and spread across different …
their deployment and implementation remain complex and spread across different …
Assessing discrepancies between network traffic and privacy policies of public sector web services
T Heino, R Carlsson, S Rauti, V Leppänen - Proceedings of the 17th …, 2022 - dl.acm.org
Online services are increasingly being used to complete everyday tasks, and ordinary users
with very little technical knowledge have learned to use web services and applications. At …
with very little technical knowledge have learned to use web services and applications. At …
Tracking personal identifiers across the web
User tracking has become de facto practice of the Web, however, our understanding of the
scale and nature of this practice remains rudimentary. In this paper, we explore the …
scale and nature of this practice remains rudimentary. In this paper, we explore the …
Should you use the app for that? comparing the privacy implications of app-and web-based online services
Many popular, free online services provide cross-platform interfaces via Web browsers as
well as apps on iOS and Android. To monetize these services, many additionally include …
well as apps on iOS and Android. To monetize these services, many additionally include …