Filters








16,040 Hits in 7.2 sec

I never signed up for this! Privacy implications of email tracking

Steven Englehardt, Jeffrey Han, Arvind Narayanan
2018 Proceedings on Privacy Enhancing Technologies  
We show that the simple act of viewing emails contains privacy pitfalls for the unwary.  ...  We assembled a corpus of commercial mailing-list emails, and find a network of hundreds of third parties that track email recipients via methods such as embedded pixels.  ...  We're also grateful to Günes Acar, Paul Ellenbogen, Marc Juarez, Harry Kalodner, Marcela Melara, and Laura Roberts for their assistance in compiling data for our email survey.  ... 
doi:10.1515/popets-2018-0006 dblp:journals/popets/EnglehardtHN18 fatcat:xfvqleg4evhi3oswb6kk26ychq

What'S This?

Paul Stokes, Geneen Stubbs, Nathan Thomas
2011 Zenodo  
The development and evaluation of a location based education enhancement system for use with network connected mobile devices and two-dimensional (QR) codes.  ...  MSc Thesis submitted to University of Glamorgan / Prifysgol Morgannwg Faculty of Advanced Technology  ...  "Hi Phil, I woke up at about 3:00 am this morning thinking more about the QR pilot project I outlined in my email yesterday. I don't know if U.N.C.L.E.  ... 
doi:10.5281/zenodo.52457 fatcat:csudw5ib7bhknhq5uw2l4x2rqu

If This Then What?

Iulia Bastys, Musard Balliu, Andrei Sabelfeld
2018 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18  
For longterm protection, we develop a framework for information flow tracking in IoT apps.  ...  We show how to implement the approach for an IFTTT-inspired setting leveraging state-of-the-art information flow tracking techniques for JavaScript based on the JSFlow tool and evaluate its effectiveness  ...  It was also partly funded by the Swedish Foundation for Strategic Research (SSF) and the Swedish Research Council (VR).  ... 
doi:10.1145/3243734.3243841 dblp:conf/ccs/BastysBS18 fatcat:voeddsb5zndsjk3rphygofpvsa

What'S This? (Digest Version)

Paul Stokes, Geneen Stubbs, Nathan Thomas
2011 Zenodo  
The development and evaluation of a location based education enhancement system for use with network connected mobile devices and two-dimensional (QR) codes.  ...  MSc Thesis submitted to University of Glamorgan / Prifysgol Morgannwg Faculty of Advanced Technology Digest version (without expanded appendices)  ...  Acknowledgements "QR code" is a registered trademark of Denso Wave Incorporated.  ... 
doi:10.5281/zenodo.52456 fatcat:44owmkpbqnemnhvm4nwxbyhene

Why Do You Need This?

Anna Rudnicka, Anna L. Cox, Sandy J. J. Gould
2019 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI '19  
didn't ask me in advance if I was OK to share that kind of information').  ...  'Existing laws and organizational practices provide a reasonable level of protection for consumer privacy today. ' This scale enables classification of participants as either privacy fundamentalists who  ... 
doi:10.1145/3290605.3300622 dblp:conf/chi/RudnickaCG19 fatcat:5hczqimlr5aixdqtsdy2lwolwy

Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions

Noura Aleisa, Karen Renaud
2017 Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security  
This paper reports on a study to assess current awareness of privacy implications of IoT devices amongst Saudi Arabians.  ...  We found that even when users are aware of the potential for privacy invasion, their need for the convenience these devices afford leads them to discount this potential and to ignore any concerns they  ...  ACKNOWLEDGEMENT We thank Lewis Mackenzie for his feedback on an earlier draft of this paper.  ... 
doi:10.5220/0006233701980205 dblp:conf/iotbd/AleisaR17 fatcat:fwy6lykun5hxtp2p4l745o7nte

"This is how we do it in my country"

Susan P. Wyche, Rebecca E. Grinter
2012 Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work - CSCW '12  
The contributions of this work are primarily empirical.  ...  We present design implications and reflect on how understanding Kenyan migrants' ICT practices can positively influence design for the broader population.  ...  Thank you to Morgan Ames, Jenna Burrell, Marshini Chetty, Aditya Johri, Erika Poole, Jennifer Rode, and anonymous reviewers for feedback on earlier drafts of this paper.  ... 
doi:10.1145/2145204.2145222 dblp:conf/cscw/WycheG12 fatcat:lb43pqyjtvad7lyeagvf7omkiu

How acceptable is this? How user experience factors can broaden our understanding of the acceptance of privacy trade-offs

Verena Distler, Carine Lallemand, Vincent Koenig
2019 Computers in Human Behavior  
implications for the design of privacy-relevant systems.  ...  Participants also considered spam one risk of signing up to the social network, but this was not enough to make the scenario unacceptable, given that they were already used to spam.  ...  While this calls for further research, it also points out that pragmatic aspects alone are insufficient for explaining privacy trade-offs; a prominent example is that of "control" or "autonomy" suggesting  ... 
doi:10.1016/j.chb.2019.106227 fatcat:3miym4dtrnf25budq2oddsh3ya

"Antarctica just has this hero factor…": Gendered barriers to Australian Antarctic research and remote fieldwork

Meredith Nash, Hanne E. F. Nielsen, Justine Shaw, Matt King, Mary-Anne Lea, Narissa Bax, Christopher D. Lynn
2019 PLoS ONE  
Although women are entering polar science in greater numbers, a key theme of the qualitative findings of this survey is that gendered barriers to participation in research and fieldwork persist.  ...  This article presents findings from an exploratory online survey examining how 95 women experienced research and remote Antarctic fieldwork with the Australian Antarctic Program.  ...  Acknowledgments We wish to thank our survey respondents for generously sharing their experiences.  ... 
doi:10.1371/journal.pone.0209983 pmid:30650104 pmcid:PMC6334902 fatcat:ngleug5tyzbk7lurvoej5k4eqe

Police surveillance of cell phone location data: Supreme Court versus public opinion

Emma W. Marshall, Jennifer L. Groscup, Eve M. Brank, Analay Perez, Lori A. Hoetger
2019 Behavioral sciences & the law  
These results have implications for the police and courts considering how the Fourth Amendment will apply to smart phone technologies.  ...  Results suggest that cell phone location data is perceived as more private and deserving of protections than other types of location data, but the privacy of other types of information recorded on cell  ...  Specifically, this research investigated privacy expectations for cell phone contents, email, Cloud storage use, GPS tracking, and location tracking on cell phones.  ... 
doi:10.1002/bsl.2442 pmid:31997422 fatcat:zu6s2cd5ibftrfdxvblrs5cm64

"I Cannot Do All of This Alone": Exploring Instrumental and Prayer Support in Online Health Communities [article]

C. Estelle Smith, Zachary Levonian, Haiwei Ma, Robert Giaquinto, Gemma Lein-Mcdonough, Zixuan Li, Susan O'Conner-Von, Svetlana Yarosh
2020 arXiv   pre-print
We discuss design implications to accommodate divergent preferences and to expand the instrumental support network.  ...  Phase one involves a content analysis of 641 CaringBridge updates. Phase two is a survey of 991 CaringBridge users.  ...  For example, in the Planner, if patients/caregivers create a calendar task related to chores, FFA could be offered an option to either sign up themselves, or else pay for services such as house cleaning  ... 
arXiv:2005.11884v1 fatcat:ulinarvgfbaxvcqvayfyawyobi

This American Copyright Life: Reflections on Re-Equilibrating Copyright for the Internet Age

Peter S. Menell
2013 Social Science Research Network  
None of these people bear responsibility for what follows -and I suspect many will disagree with some or all of what I have to say.  ...  Following my presentation of the Brace Lecture, I had the opportunity to reprise the lecture at Cardozo Law School, George Washington Law School (and the D.C. Chapter of the  ...  The first mode implicates enforcement. The second implicates the scope of copyright protection.  ... 
doi:10.2139/ssrn.2347674 fatcat:ad7cz45uhjckvkorluprevl6ii

The Privacy Policy Paradox

Rena Coen, Jennifer King, Richmond Y. Wong
2016 Symposium On Usable Privacy and Security  
However, to date no one has examined them from the angle we are proposing for this study: to determine whether the presence of a privacy policy link on a website has any significant influence on one's  ...  There have been multiple studies exploring the content and efficacy of privacy policies.  ...  ACKNOWLEDGMENTS We thank Heather Patterson for her feedback and Steve Weber for his initial support. This project is generously supported by a gift from the Intel Corporation.  ... 
dblp:conf/soups/CoenKW16 fatcat:rt5kskyljvg4vmwtgnf5snzzfq

Americans' attitudes about internet behavioral advertising practices

Aleecia M. McDonald, Lorrie Faith Cranor
2010 Proceedings of the 9th annual ACM workshop on Privacy in the electronic society - WPES '10  
We find a gap between people's willingness to pay to protect their privacy and their willingness to accept discounts in exchange for private information. 69% believe privacy is a right and 61% think it  ...  About 20% of participants want the benefits of targeted advertising, but 64% find the idea invasive, and we see signs of a possible chilling effect with 40% self-reporting they would change their online  ...  This has implications for public policy, commerce, and technologists.  ... 
doi:10.1145/1866919.1866929 dblp:conf/wpes/McDonaldC10 fatcat:4tsh4y34zbdprb7ftzmuz44ray

A Note on Privacy

2018 Muma Case Review  
This note provides a basic overview of privacy issues, with an emphasis on the implications of the web and social networks.  ...  Acknowledgements Development of this note is based upon work supported by the National Science Foundation under Grant No. 1418711.  ...  Biography Onochie Fan-Osuala is a PhD Candidate in information systems (IS) at the Muma College of Business, University of South Florida.  ... 
doi:10.28945/4204 fatcat:rx3xsvdedvgarep2d4t4xn46bi
« Previous Showing results 1 — 15 out of 16,040 results