Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Shakthidhar Gopavaram"'
Autor:
Jacob Abbott, Jayati Dev, Donginn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana Ringenberg, Vafa Andalibi, L. Jean Camp
Publikováno v:
2022 European Symposium on Usable Security.
Publikováno v:
Information & Computer Security. 29:680-693
Purpose The purpose of this paper is to propose practical and usable interactions that will allow more informed, risk-aware comparisons for individuals during app selections. The authors include an explicit argument for the role of human decision-mak
Publikováno v:
SSRN Electronic Journal.
Willingness-To-Pay (WTP) is the most a person is willing to pay for a good or service. Conversely, Willingness-To-Accept (WTA) is the minimum amount a person is willing to accept for giving up a good or service. People often attribute a higher value
Publikováno v:
WPES@CCS
The severity of COVID-19 and the need for contact tracing has resulted in new urgency for investigating two mutually exclusive narratives about the importance of privacy. The assertion by some technology advocates that privacy is no longer an issue i
Publikováno v:
Frontiers in Psychology, Vol 11 (2020)
Frontiers in Psychology
Frontiers in Psychology
Android and iOS mobile operating systems use permissions to enable phone owners to manage access to their device's resources. Both systems provide resource access dialogues at first use and per-resource controls. Android continues to offer permission
Publikováno v:
SSRN Electronic Journal.
Solutions to phishing have included discrete training, stand-alone warnings,and automatic blocking. We integrated personalized blocking, filtering, and alerts into a single holistic risk-management tool, which leverages simple metaphorical cartoons t
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783030544546
Financial Cryptography Workshops
Financial Cryptography Workshops
Solutions to phishing have included training users, stand-alone warnings, and automatic blocking. We integrated personalized blocking, filtering, and alerts into a single holistic risk-management tool, which leverages simple metaphorical cartoons tha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::98e4ef6f8435d40a20f96502dbe067d0
https://doi.org/10.1007/978-3-030-54455-3_2
https://doi.org/10.1007/978-3-030-54455-3_2
Publikováno v:
Human Aspects of Information Security and Assurance ISBN: 9783030574031
HAISA
HAISA
In the age of ubiquitous technologies, security- and privacy-focused choices have turned out to be a significant concern for individuals and organizations. Risks of such pervasive technologies are extensive and often misaligned with user risk percept
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3c764e2a3c93f83edd3231d7fdc17348
https://doi.org/10.1007/978-3-030-57404-8_16
https://doi.org/10.1007/978-3-030-57404-8_16
Publikováno v:
Annals of Disaster Risk Sciences : ADRS
Volume 3
Issue 2
Volume 3
Issue 2
The on-going COVID-19 pandemic has brought surveillance and privacy concerns to the forefront, given that contact tracing has been seen as a very effective tool to prevent the spread of infectious disease and that public authorities and government of
Autor:
Jennifer Olive, Ben Miller, Ayush Shrestha, Shakthidhar Gopavaram, Cynthia M. Berger, Yanjun Zhao
Publikováno v:
IEEE BigData
Identifying similar narrative sections across longer documents would help identify key events within a corpus, enrich understanding of those events, provide a mechanism for organizing corpora according to their event content, and allow for bottom-up