Skip to main content

Pardis Emami-Naeini

Assistant Professor of Computer Science
Computer Science

Selected Publications


“I Deleted It Afer the Overturn of Roe v. Wade”: Understanding Women's Privacy Concerns Toward Period-Tracking Apps in the Post Roe v. Wade Era

Conference Conference on Human Factors in Computing Systems - Proceedings · May 11, 2024 The overturn of Roe v. Wade has taken away the constitutional right to abortion. Prior work shows that period-tracking apps' data practices can be used to detect pregnancy and abortion, hence putting women at risk of being prosecuted. It is unclear how muc ... Full text Cite

Well-intended but half-hearted: Hosts' consideration of guests' privacy using smart devices on rental properties

Conference Proceedings of the 20th Symposium on Usable Privacy and Security, SOUPS 2024 · January 1, 2024 The increased use of smart home devices (SHDs) on short-term rental (STR) properties raises privacy concerns for guests. While previous literature identifies guests' privacy concerns and the need to negotiate guests' privacy preferences with hosts, there i ... Cite

Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtual Reality

Conference Proceedings - IEEE Symposium on Security and Privacy · January 1, 2024 Recent years have seen a sharp increase in the number of underage users in virtual reality (VR), where security and privacy (S&P) risks such as data surveillance and self-disclosure in social interaction have been increasingly prominent. Prior work shows c ... Full text Cite

"dump it, Destroy it, Send it to Data Heaven": Blind People's Expectations for Visual Privacy in Visual Assistance Technologies

Conference ACM International Conference Proceeding Series · April 30, 2023 Visual assistance technologies provide people who are blind with access to information about their visual surroundings by digitally connecting them to remote humans or artificial intelligence systems that describe visual content such as objects, people, sc ... Full text Cite

Understanding People's Concerns and Attitudes Toward Smart Cities

Conference Conference on Human Factors in Computing Systems - Proceedings · April 19, 2023 Designing privacy-respecting and human-centric smart cities requires a careful investigation of people's attitudes and concerns toward city-wide data collection scenarios. To capture a holistic view, we carried out this investigation in two phases. We firs ... Full text Cite

Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy

Conference Proceedings - IEEE Symposium on Security and Privacy · January 1, 2023 Gender stereotypes remain common in U.S. society and harm people of all genders. Focusing on binary genders (women and men) as a first investigation, we empirically study gender stereotypes related to computer security and privacy. We used Prolific to cond ... Full text Cite

“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse

Conference 32nd USENIX Security Symposium, USENIX Security 2023 · January 1, 2023 Victim-survivors of intimate partner violence (IPV) are facing a new technological threat: Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS trackers to spy on and harass victim-survivors. Though prior work provides a fo ... Cite

Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse

Conference 32nd USENIX Security Symposium, USENIX Security 2023 · January 1, 2023 Tech-enabled interpersonal abuse (IPA) is a pervasive problem. Abusers, often intimate partners, use tools such as spyware to surveil and harass victim-survivors. Unfortunately, anecdotal evidence suggests that smart, Internet-connected devices such as hom ... Cite

Are Consumers Willing to Pay for Security and Privacy of IoT Devices?

Conference 32nd USENIX Security Symposium, USENIX Security 2023 · January 1, 2023 Internet of Things (IoT) device manufacturers provide little information to consumers about their security and data handling practices. Therefore, IoT consumers cannot make informed purchase choices around security and privacy. While prior research has fou ... Cite

Exploring Deceptive Design Patterns in Voice Interfaces

Conference ACM International Conference Proceeding Series · September 29, 2022 Deceptive design patterns (sometimes called "dark patterns") are user interface design elements that may trick, deceive, or mislead users into behaviors that often benefit the party implementing the design over the end user. Prior work has taxonomized, inv ... Full text Cite