Zobrazeno 1 - 10
of 86
pro vyhledávání: '"Lipford, Heather"'
Publikováno v:
Proceedings on Privacy Enhancing Technologies 2025
We conducted a 4-week field study with 101 smartphone users who self-organized into 22 small groups of family, friends, and neighbors to use ``CO-oPS,'' a mobile app for co-managing mobile privacy and security. We differentiated between those who pro
Externí odkaz:
http://arxiv.org/abs/2409.02364
Autor:
Klemmer, Jan H., Horstmann, Stefan Albert, Patnaik, Nikhil, Ludden, Cordelia, Burton Jr., Cordell, Powers, Carson, Massacci, Fabio, Rahman, Akond, Votipka, Daniel, Lipford, Heather Richter, Rashid, Awais, Naiakshina, Alena, Fahl, Sascha
Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub Copilot, the software industry quickly utilized these tools for software development tasks, e.g., generating code or consulting AI for advice. While recent research ha
Externí odkaz:
http://arxiv.org/abs/2405.06371
Autor:
Akter, Mamtaj, Alghamdi, Leena, Gillespie, Dylan, Miazi, Nazmus, Kropczynski, Jess, Lipford, Heather, Wisniewski, Pamela
Smartphone users install numerous mobile apps that require access to different information from their devices. Much of this information is very sensitive, and users often struggle to manage these accesses due to their lack of tech expertise and knowl
Externí odkaz:
http://arxiv.org/abs/2404.10258
As adoption of mobile phones has skyrocketed, so have scams involving them. The text method is called SMiShing, (aka SMShing, or smishing) in which a fraudster sends a phishing link via Short Message Service (SMS) text to a phone. However, no data ex
Externí odkaz:
http://arxiv.org/abs/2309.06322
Autor:
Akter, Mamtaj, Tabassum, Madiha, Miazi, Nazmus Sakib, Alghamdi, Leena, Kropczynski, Jess, Wisniewski, Pamela, Lipford, Heather
Mobile privacy and security can be a collaborative process where individuals seek advice and help from their trusted communities. To support such collective privacy and security management, we developed a mobile app for Community Oversight of Privacy
Externí odkaz:
http://arxiv.org/abs/2306.02289
Publikováno v:
Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems
We conducted a user study with 19 parent-teen dyads to understand the perceived benefits and drawbacks of using a mobile app that allows them to co-manage mobile privacy, safety, and security within their families. While the primary goal of the study
Externí odkaz:
http://arxiv.org/abs/2306.02287
We conducted 26 co-design interviews with 50 smarthome device owners to understand the perceived benefits, drawbacks, and design considerations for developing a smarthome system that facilitates co-monitoring with emergency contacts who live outside
Externí odkaz:
http://arxiv.org/abs/2301.06652
Our research aims to highlight and alleviate the complex tensions around online safety, privacy, and smartphone usage in families so that parents and teens can work together to better manage mobile privacy and security-related risks. We developed a m
Externí odkaz:
http://arxiv.org/abs/2204.07749
The best practice to prevent Cross Site Scripting (XSS) attacks is to apply encoders to sanitize untrusted data. To balance security and functionality, encoders should be applied to match the web page context, such as HTML body, JavaScript, and style
Externí odkaz:
http://arxiv.org/abs/1804.01862
Input sanitization mechanisms are widely used to mitigate vulnerabilities to injection attacks such as cross-site scripting. Static analysis tools and techniques commonly used to ensure that applications utilize sanitization functions. Dynamic analys
Externí odkaz:
http://arxiv.org/abs/1804.00753