Zobrazeno 1 - 10
of 67
pro vyhledávání: '"J. Aviv"'
Autor:
Peter Mayer, Yixin Zou, Byron M. Lowens, Hunter A. Dyer, Khue Le, Florian Schaub, Adam J. Aviv
Publikováno v:
ACM Transactions on Computer-Human Interaction.
Data breaches are prevalent. We provide novel insights into individuals’ awareness, perception, and responses to breaches that affect them through two online surveys: a main survey ( n = 413) in which we presented participants with up to three brea
Autor:
Xiaoyuan Wu, Collins W. Munyendo, Eddie Cosic, Genevieve A. Flynn, Olivia Legault, Adam J. Aviv
Publikováno v:
Proceedings of the 38th Annual Computer Security Applications Conference.
Publikováno v:
ACM Transactions on Privacy and Security. 24:1-36
In this article, we provide the first comprehensive study of user-chosen four- and six-digit PINs ( n =1705) collected on smartphones with participants being explicitly primed for device unlocking. We find that against a throttled attacker (with 10,
'Warn Them' or 'Just Block Them'?: Investigating Privacy Concerns Among Older and Working Age Adults
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2021, Iss 2, Pp 27-47 (2021)
Prior work suggests that older adults are less aware of potential digital privacy risks compared to younger groups. We seek to expand on these findings by using drawmetrics with 20 older adults (60+) to visualize their experiences with digital privac
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2021, Iss 2, Pp 151-172 (2021)
Smart DNS (SDNS) services advertise access to "geofenced" content (typically, video streaming sites such as Netflix or Hulu) that is normally inaccessible unless the client is within a prescribed geographic region. SDNS is simple to use and involves
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP).
Publikováno v:
CHI Conference on Human Factors in Computing Systems.
Publikováno v:
Proceedings of the 19th International Web for All Conference.
Publikováno v:
NDSS
Publikováno v:
CHI Extended Abstracts
Android unlock patterns are a widely used form of graphical passwords, and like all password schemes, numerous studies have shown that users select a relatively guessable and non-diverse set of passwords. While proposals have been put forth for harde