Zobrazeno 1 - 10
of 77
pro vyhledávání: '"AVIV, ADAM J."'
We draw on the Protection Motivation Theory (PMT) to design nudges that encourage users to change breached passwords. Our online experiment ($n$=$1,386$) compared the effectiveness of a threat appeal (highlighting negative consequences of breached pa
Externí odkaz:
http://arxiv.org/abs/2405.15308
Data dashboards are designed to help users manage data collected about them. However, prior work showed that exposure to some dashboards, notably Google's My Activity dashboard, results in significant decreases in perceived concern and increases in p
Externí odkaz:
http://arxiv.org/abs/2312.13813
Apple introduced privacy labels in Dec. 2020 as a way for developers to report the privacy behaviors of their apps. While Apple does not validate labels, they also require developers to provide a privacy policy, which offers an important comparison p
Externí odkaz:
http://arxiv.org/abs/2306.17063
Autor:
Balash, David G., Fainchtein, Rahel A., Korkes, Elena, Grant, Miles, Sherr, Micah, Aviv, Adam J.
The onset of the COVID-19 pandemic changed the landscape of education and led to increased usage of remote proctoring tools that are designed to monitor students when they take assessments outside the classroom. While prior work has explored students
Externí odkaz:
http://arxiv.org/abs/2302.12936
In December of 2020, Apple started to require app developers to self-report privacy label annotations on their apps indicating what data is collected and how it is used.To understand the adoption and shifts in privacy labels in the App Store, we coll
Externí odkaz:
http://arxiv.org/abs/2206.02658
Online services like Google provide a variety of application programming interfaces (APIs). These online APIs enable authenticated third-party services and applications (apps) to access a user's account data for tasks such as single sign-on (SSO), ca
Externí odkaz:
http://arxiv.org/abs/2111.03573
Publikováno v:
Symposium on Usable Privacy and Security 2021 (SOUPS '21)
We conducted an online study with $n = 235$ Signal users on their understanding and usage of PINs in Signal. In our study, we observe a split in PIN management and composition strategies between users who can explain the purpose of the Signal PINs (5
Externí odkaz:
http://arxiv.org/abs/2106.09006
Autor:
Balash, David G., Kim, Dongkun, Shaibekova, Darikia, Fainchtein, Rahel A., Sherr, Micah, Aviv, Adam J.
In response to the Covid-19 pandemic, educational institutions quickly transitioned to remote learning. The problem of how to perform student assessment in an online environment has become increasingly relevant, leading many institutions and educator
Externí odkaz:
http://arxiv.org/abs/2106.05917
People are frequently required to send documents, forms, or other materials containing sensitive data (e.g., personal information, medical records, financial data) to remote parties, sometimes without a formal procedure to do so securely. The specifi
Externí odkaz:
http://arxiv.org/abs/2105.14619
Privacy dashboards and transparency tools help users review and manage the data collected about them online. Since 2016, Google has offered such a tool, My Activity, which allows users to review and delete their activity data from Google services. We
Externí odkaz:
http://arxiv.org/abs/2105.14066