Zobrazeno 1 - 10
of 94
pro vyhledávání: '"EGELMAN, SERGE"'
Autor:
Samarin, Nikita, Sanchez, Alex, Chung, Trinity, Juleemun, Akshay Dan Bhavish, Gilsenan, Conor, Merrill, Nick, Reardon, Joel, Egelman, Serge
Like most modern software, secure messaging apps rely on third-party components to implement important app functionality. Although this practice reduces engineering costs, it also introduces the risk of inadvertent privacy breaches due to misconfigur
Externí odkaz:
http://arxiv.org/abs/2407.10589
Autor:
Samarin, Nikita, Kothari, Shayna, Siyed, Zaina, Bjorkman, Oscar, Yuan, Reena, Wijesekera, Primal, Alomar, Noura, Fischer, Jordan, Hoofnagle, Chris, Egelman, Serge
The California Consumer Privacy Act (CCPA) provides California residents with a range of enhanced privacy protections and rights. Our research investigated the extent to which Android app developers comply with the provisions of the CCPA that require
Externí odkaz:
http://arxiv.org/abs/2304.00944
Compared to organizations in other sectors, civil society organizations (CSOs) are particularly vulnerable to security and privacy threats, as they lack adequate resources and expertise to defend themselves. At the same time, their security needs and
Externí odkaz:
http://arxiv.org/abs/2003.08580
Autor:
Choi, Jaeyoung, Akkus, Istemi Ekin, Egelman, Serge, Friedland, Gerald, Sommer, Robin, Tschantz, Michael Carl, Weaver, Nicholas
Under U.S. law, marketing databases exist under almost no legal restrictions concerning accuracy, access, or confidentiality. We explore the possible (mis)use of these databases in a criminal context by conducting two experiments. First, we show how
Externí odkaz:
http://arxiv.org/abs/1811.06584
Google's Ad Settings shows the gender and age that Google has inferred about a web user. We compare the inferred values to the self-reported values of 501 survey participants. We find that Google often does not show an inference, but when it does, it
Externí odkaz:
http://arxiv.org/abs/1808.07549
Publikováno v:
NDSS Workshop on Usable Security, San Diego (USEC 2018)
Software updates are critical to the performance, compatibility, and security of software systems. However, users do not always install updates, leaving their machines vulnerable to attackers' exploits. While recent studies have highlighted numerous
Externí odkaz:
http://arxiv.org/abs/1805.04594
Autor:
Wijesekera, Primal, Baokar, Arjun, Tsai, Lynn, Reardon, Joel, Egelman, Serge, Wagner, David, Beznosov, Konstantin
Current smartphone operating systems regulate application permissions by prompting users on an ask-on-first-use basis. Prior research has shown that this method is ineffective because it fails to account for context: the circumstances under which an
Externí odkaz:
http://arxiv.org/abs/1703.02090
Publikováno v:
ACM Transactions on Computer-Human Interaction (TOCHI); Oct2024, Vol. 31 Issue 5, p1-25, 25p
Publikováno v:
Berkeley Technology Law Journal, 2020 Jan 01. 35(1), 327-365.
Externí odkaz:
https://www.jstor.org/stable/26954425
Wearable devices, or "wearables," bring great benefits but also potential risks that could expose users' activities with- out their awareness or consent. In this paper, we report findings from the first large-scale survey conducted to investigate use
Externí odkaz:
http://arxiv.org/abs/1504.05694