ConferenceConference on Human Factors in Computing Systems - Proceedings · May 11, 2024
The overturn of Roe v. Wade has taken away the constitutional right to abortion. Prior work shows that period-tracking apps' data practices can be used to detect pregnancy and abortion, hence putting women at risk of being prosecuted. It is unclear how muc ...
Full textCite
ConferenceProceedings of the 20th Symposium on Usable Privacy and Security, SOUPS 2024 · January 1, 2024
The increased use of smart home devices (SHDs) on short-term rental (STR) properties raises privacy concerns for guests. While previous literature identifies guests' privacy concerns and the need to negotiate guests' privacy preferences with hosts, there i ...
Cite
ConferenceProceedings - IEEE Symposium on Security and Privacy · January 1, 2024
Recent years have seen a sharp increase in the number of underage users in virtual reality (VR), where security and privacy (S&P) risks such as data surveillance and self-disclosure in social interaction have been increasingly prominent. Prior work shows c ...
Full textCite
ConferenceACM International Conference Proceeding Series · April 30, 2023
Visual assistance technologies provide people who are blind with access to information about their visual surroundings by digitally connecting them to remote humans or artificial intelligence systems that describe visual content such as objects, people, sc ...
Full textCite
ConferenceConference on Human Factors in Computing Systems - Proceedings · April 19, 2023
Designing privacy-respecting and human-centric smart cities requires a careful investigation of people's attitudes and concerns toward city-wide data collection scenarios. To capture a holistic view, we carried out this investigation in two phases. We firs ...
Full textCite
ConferenceProceedings - IEEE Symposium on Security and Privacy · January 1, 2023
Gender stereotypes remain common in U.S. society and harm people of all genders. Focusing on binary genders (women and men) as a first investigation, we empirically study gender stereotypes related to computer security and privacy. We used Prolific to cond ...
Full textCite
Conference32nd USENIX Security Symposium, USENIX Security 2023 · January 1, 2023
Victim-survivors of intimate partner violence (IPV) are facing a new technological threat: Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS trackers to spy on and harass victim-survivors. Though prior work provides a fo ...
Cite
Conference32nd USENIX Security Symposium, USENIX Security 2023 · January 1, 2023
Tech-enabled interpersonal abuse (IPA) is a pervasive problem. Abusers, often intimate partners, use tools such as spyware to surveil and harass victim-survivors. Unfortunately, anecdotal evidence suggests that smart, Internet-connected devices such as hom ...
Cite
Conference32nd USENIX Security Symposium, USENIX Security 2023 · January 1, 2023
Internet of Things (IoT) device manufacturers provide little information to consumers about their security and data handling practices. Therefore, IoT consumers cannot make informed purchase choices around security and privacy. While prior research has fou ...
Cite
ConferenceACM International Conference Proceeding Series · September 29, 2022
Deceptive design patterns (sometimes called "dark patterns") are user interface design elements that may trick, deceive, or mislead users into behaviors that often benefit the party implementing the design over the end user. Prior work has taxonomized, inv ...
Full textCite