Search Results

1 - 5 of 5 items :

  • perception of problem x
  • IT-Security and Cryptology x
Clear All
Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration

. Int. J. Man. Mach. Stud ., 35(3):363–377, Sept. 1991. [5] F. Bowden, D. Lockton, R. Gheerawo, and C. Brass. Drawing energy: Exploring perceptions of the invisible. 2015. [6] C. Bravo-Lillo, L. F. Cranor, J. Downs, and S. Komanduri. Bridging the gap in computer security warnings: A mental model approach. IEEE Secur. Privacy , 9(2):18–26, Mar. 2011. [7] J. K. Burgoon, R. Parrott, B. A. Le Poire, D. L. Kelley, J. B. Walther, and D. Perry. Maintaining and restoring privacy through communication in different types of relationships. J. Soc. Pers. Relat

Open access
Privacy Attitudes of Smart Speaker Users

Conference (EISIC) , pages 172–175. IEEE, 2016. [10] Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu, and Suman Banerjee. Characterizing privacy perceptions of voice assistants: A technology probe study. arXiv preprint arXiv:1812.00263 , 2018. [11] Eugene Cho. Hey Google, Can I Ask You Something in Private? In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems , CHI ’19, pages 258:1–258:9. ACM, 2019. [12] Paul Cutsinger. How to Improve Alexa Skill Discovery with Name-Free Interaction and More, September 2018. [13] Matt

Open access
Flying Eyes and Hidden Controllers: A Qualitative Study of People’s Privacy Perceptions of Civilian Drones in The US

.1145/2696454.2696484 [10] John Travis Butler and Arvin Agah. 2001. Psychological effects of behavior patterns of a mobile personal robot. Autonomous Robots 10, 2 (2001), 185-202. [11] Ryan Calo. 2011. The drone as privacy catalyst. Stanford Law Review Online 64 (2011), 29-33. [12] Ann Cavoukian. 2012. Privacy and drones: Unmanned aerial vehicles. Information and Privacy Commissioner of Ontario, Canada. [13] Reece A Clothier, Dominique A Greer, Duncan G Greer, and Amisha M Mehta. 2015. Risk perception and the public acceptance of drones

Open access
Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy

. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security , pages 627–638. ACM, 2011. [15] A. P. Felt, S. Egelman, and D. Wagner. I’ve got 99 problems, but vibration ain’t one: a survey of smartphone users’ concerns. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices , pages 33–44. ACM, 2012. [16] A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: User attention

Open access
SoK: Privacy on Mobile Devices – It’s Complicated

References [1] I. Leontiadis, C. Efstratiou, M. Picone, and C. Mascolo, “Don’t kill my ads!: balancing privacy in an ad-supported mobile application market,” in MobiSys 2012. [2] B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang, “Smart, useful, scary, creepy: perceptions of online behavioral advertising,” in SOUPS 2012. [3] Z. Xu, K. Bai, and S. Zhu, “Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors,” in WiSec 2012. [4] L. Cai and H. Chen

Open access