Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Alashwali, Eman"'
It might be intuitive to expect that small or reimbursed financial loss resulting from credit or debit card fraud would have low or no financial impact on victims. However, little is known about the extent to which financial fraud impacts victims psy
Externí odkaz:
http://arxiv.org/abs/2408.08131
The COVID-19 pandemic has reshaped the way people work, normalizing the practice of working from home (WFH). However, WFH can cause a blurring of personal and professional boundaries, surfacing new privacy issues, especially when workers take work me
Externí odkaz:
http://arxiv.org/abs/2407.10094
When companies release marketing materials aimed at promoting their privacy practices or highlighting specific privacy features, what do they actually communicate to consumers? In this paper, we explore the impact of privacy marketing on: (1) consume
Externí odkaz:
http://arxiv.org/abs/2405.13857
Autor:
Alashwali, Eman, Cranor, Lorrie Faith
While privacy perceptions and behaviors have been investigated in Western societies, little is known about these issues in non-Western societies. To bridge this gap, we interviewed 30 Google personal account holders in Saudi Arabia about their privac
Externí odkaz:
http://arxiv.org/abs/2308.10148
Autor:
Alashwali, Eman, Alashwali, Fatimah
In this paper, we investigate Saudi parents' privacy concerns regarding their children's smart device applications (apps). To this end, we conducted a survey and analysed 119 responses. Our results show that Saudi parents expressed a high level of co
Externí odkaz:
http://arxiv.org/abs/2105.13634
Publikováno v:
Computers & Security, vol. 97, no. 101975, 2020
If two or more identical HTTPS clients, located at different geographic locations (regions), make an HTTPS request to the same domain (e.g. example.com), on the same day, will they receive the same HTTPS security guarantees in response? Our results g
Externí odkaz:
http://arxiv.org/abs/2010.10170
Forward Secrecy (FS) is a security property in key-exchange algorithms which guarantees that a compromise in the secrecy of a long-term private-key does not compromise the secrecy of past session keys. With a growing awareness of long-term mass surve
Externí odkaz:
http://arxiv.org/abs/1907.00231
Experience shows that most researchers and developers tend to treat plain-domains (those that are not prefixed with "www" sub-domains, e.g. "example.com") as synonyms for their equivalent www-domains (those that are prefixed with "www" sub-domains, e
Externí odkaz:
http://arxiv.org/abs/1906.06505
A number of important real-world protocols including the Transport Layer Security (TLS) protocol have the ability to negotiate various security-related choices such as the protocol version and the cryptographic algorithms to be used in a particular s
Externí odkaz:
http://arxiv.org/abs/1809.05681
Most modern web browsers today sacrifice optimal TLS security for backward compatibility. They apply coarse-grained TLS configurations that support (by default) legacy versions of the protocol that have known design weaknesses, and weak ciphersuites
Externí odkaz:
http://arxiv.org/abs/1809.05686