Skip to main content

Privacy and Usability

Deliverables

Requirements Analysis

Each ESR will contribute to this deliverable with a requirements analysis report for the respective technological artifact to be developed.

Researcher Declarations and Career Development

All ESRs will submit a PhD research proposal and Career Development Plan (devised with their supervisors and co-supervisors) to the Supervisory Board to be approved and to be discussed at the Network-wide Event 3.

The Initial Models

Each ESR will submit a report with a review of the relevant and a detailed specification of the modeling approach that will be taken.

Risk Assessment

During a summer school all ESRs jointly engage in risk assessment for the four application domains of ESRs 2, 5, 10 and 11. Major risks are communicated in relevant press and policy channels.

Results of the First Training Event

Report on results of the organized training event at KAU.

Description of Technological Artifacts

This report will present the final descriptions of the technological artifacts to be developed by the ESRs. All WP2 ESRs will contribute to this deliverable.

Ethics

ethic authorisations

First Public Engagement and Dissemination Report

Periodic report summarizing and monitoring the effectiveness of the public engagement activities and the dissemination of the research outputs of all partners.

User Interface Requirements

Each ESR will submit a report with the user interface requirements for their specific part.

Results of the Second Training Event

Report on results of the organized training event at WU.

Recruitment

A report on the recruitment results from all partners.

Second Public Engagement and Dissemination Report

Periodic report summarizing and monitoring the effectiveness of the public engagement activities and the dissemination of the research outputs of all partners.

Supervisory Board of PRIVACY.US

List of members of the supervisory and management boards and the meeting minutes and of the supervisory board.

Progress Report

Annual reports for the consortium management, performance monitoring, and administrative and financial coordination.

Draft Periodic Report

Annual reports for the consortium management, performance monitoring, and administrative and financial coordination.

Searching for OpenAIRE data...

Publications

Beacon Alarming: Informed decision-making supporter and privacy risk analyser in Smartphone applications

Author(s): Majid Hatamian, Jetzabel Serna-Olvera
Published in: 2017 IEEE International Conference on Consumer Electronics (ICCE), 2017, Page(s) 468-471
DOI: 10.1109/ICCE.2017.7889399

Is It Harmful? Measuring People's Perceptions of Online Privacy Issues

Author(s): Kitkowska, Agnieszka; Meyer, Joachim; Wästlund, Erik; Martucci, Leonardo
Published in: Posters -- 13th Symposium on Usable Privacy and Security (SOUPS 2017), 2017
DOI: 10.5281/zenodo.1117769

ARM: ANN-based ranking model for privacy and security analysis in smartphone ecosystems

Author(s): Majid Hatamian, Jetzabel Serna
Published in: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6
DOI: 10.1109/CCST.2017.8167854

Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr

Author(s): Warner, M.; Gutmann, A.; Sasse, M. A.; Blandford, A.
Published in: ACM Conference on Computer-Supported Cooperative Work and Social Computing, Issue 2018, 2018

A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications

Author(s): Harborth, David; Hatamian, Majid; Tesfay, Welderufael B.; Rannenberg, Kai
Published in: 52nd Hawaii International Conference on System Sciences, Issue HICSS, 2019
DOI: 10.5281/zenodo.1484307

PAPEETE: Private, Authorized, and Fast Personal Genomic Testing

Author(s): Perillo, A. M.; De Cristofaro, E.
Published in: SECRYPT, Issue 2018, 2018

Let there be LITE - design and evaluation of a label for IoT transparency enhancement

Author(s): Alexandr Railean, Delphine Reinhardt
Published in: Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct - MobileHCI '18, 2018, Page(s) 103-110
DOI: 10.1145/3236112.3236126

Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios

Author(s): Volkamer, M.; Gutmann, A.; Renaud, K.; Gerber, P.; Mayer, P.
Published in: Proceedings of the Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), Issue 2018, 2018

Is It Harmful? Re-examining Privacy Concerns

Author(s): Kitkowska, Agnieszka; Meyer, Joachim; Wästlund, Erik; Martucci, Leonardo A.
Published in: IFIP Summer School on Privacy and Identity Management, Issue 2017, 2018
DOI: 10.5281/zenodo.1297340

ARM: ANN-based ranking model for privacy and security analysis in smartphone ecosystems

Author(s): Hatamian, Majid; Serna, Jetzabel
Published in: IEEE International Carnahan Conference on Security Technology (ICCST 2017), Issue 2017, 2017
DOI: 10.5281/zenodo.1484336

"""23andMe confirms: I'm super white"" -- Analyzing Twitter Discourse On Genetic Testing"

Author(s): Mittos, Alexandros; Blackburn, Jeremy; De Cristofaro, Emiliano
Published in: 5th International Workshop on ​Genome Privacy and Security (GenoPri’18), Issue 2018, 2018

Do I Really Have To Publicly Disclose My HIV Status?

Author(s): Warner, M.; Blandford, A.
Published in: CHI ’18 Workshop: Moving beyond a “one-size fits all” approach: Exploring Individual Differences in Privacy, Montreal, Canada. (2018), Issue 2018, 2018

Reaching Beyond Borders: Investigating Differences in Privacy Harms Concerns

Author(s): Agnieszka Kitkowska
Published in: CHI Workshop “Moving Beyond a One-Size Fits All Approach: Exploring Individual Differences in Privacy, Issue 2018, 2018
DOI: 10.5281/zenodo.1265726

"""It's shocking!"": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser"

Author(s): Hatamian, Majid; Kitkowska, Agnieszka; Korunovska, Jana; Kirrane, Sabrina
Published in: 32nd Annual Conference on Data and Applications Security and Privacy (DBSec 2018)., Issue 2018, 2018
DOI: 10.5281/zenodo.1261200

Signal Appropriation of Explicit HIV Status Disclosure Fields in Sex-Social Apps used by Gay and Bisexual Men

Author(s): Mark Warner, Juan F. Maestre, Jo Gibbs, Chia-Fang Chung, Ann Blandford
Published in: ACM CHI Conference on Human Factors in Computing Systems (CHI 2019), Issue 2019, 2019
DOI: 10.1145/3290605.3300922

Usable transparency for enhancing privacy in mobile health apps

Author(s): Patrick Murmann
Published in: Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct - MobileHCI '18, 2018, Page(s) 440-442
DOI: 10.1145/3236112.3236184

Taken Out of Context: Security Risks with Security Code AutoFill in iOS & macOS

Author(s): Gutmann, A.; Murdoch, S. J.
Published in: In: Proceedings of Who Are You?! Adventures in Authentication Workshop (WAY 2019). USENIX: Santa Clara, CA, USA. (2019) (In press)., Issue 1, 2019

(In)escapable Affect? Exploring Factors Influencing Privacy-Related Behavioral Intentions

Author(s): Agnieszka Kitkowska, Erik Wästlund, Leonardo A. Martucci
Published in: Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
DOI: 10.24251/hicss.2020.503

Evaluating 'Prefer not to say' Around Sensitive Disclosures

Author(s): Mark Warner, Agnieszka Kitkowska, Jo Gibbs, Juan F. Maestre, Ann Blandford
Published in: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, Page(s) 1-13
DOI: 10.1145/3313831.3376150

"How Much Does GenoGuard Really ""Guard""? An Empirical Analysis of Long-Term Security for Genomic Data"

Author(s): Oprisanu, Bristena; Dessimoz, Christophe; De Cristofaro, Emiliano
Published in: WPES'19: Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. (pp. pp. 93-105). ACM: New York, United States. (2019), Issue 2, 2019
DOI: 10.1145/3338498.3358641

"""Hard to understand, easy to ignore:"" an automated approach to predict mobile app permission requests - student research abstract"

Author(s): Majid Hatamian
Published in: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019, Page(s) 1979-1982
DOI: 10.1145/3297280.3297660

Achieving Consistency of Software Updates against Strong Attackers

Author(s): Lamya Abdullah, Sebastian Hahn, Felix Freiling
Published in: Proceedings of the Third Central European Cybersecurity Conference on - CECC 2019, 2019, Page(s) 1-6
DOI: 10.1145/3360664.3360670

“And We Will Fight for Our Race!” A Measurement Study of Genetic Testing Conversations on Reddit and 4chan

Author(s): Alexandros Mittos, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro
Published in: Proceedings of the International AAAI Conference on Web and Social Media, Issue 14, 2020, Page(s) 452-463

Tools for Achieving Usable Ex Post Transparency: A Survey

Author(s): Patrick Murmann, Simone Fischer-Hubner
Published in: IEEE Access, Issue 5, 2017, Page(s) 22965-22991, ISSN 2169-3536
DOI: 10.1109/access.2017.2765539

Vertrauenswürdiges Backend

Author(s): Hubert A. Jäger, Lamya Abdullah, Juan Quintero
Published in: Datenschutz und Datensicherheit - DuD, Issue 41/12, 2017, Page(s) 729-734, ISSN 1614-0702
DOI: 10.1007/s11623-017-0868-y

Revealing the unrevealed: Mining smartphone users privacy perception on app markets


Published in: ISSN 0167-4048
DOI: 10.1016/j.cose.2019.02.010

"""I feel like only half a man"""

Author(s): Dilisha Patel, Ann Blandford, Mark Warner, Jill Shawe, Judith Stephenson
Published in: Proceedings of the ACM on Human-Computer Interaction, Issue 3/CSCW, 2019, Page(s) 1-20, ISSN 2573-0142
DOI: 10.1145/3359184

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective

Author(s): Alexandros Mittos, Bradley Malin, Emiliano De Cristofaro
Published in: Proceedings on Privacy Enhancing Technologies, Issue 2019/1, 2019, Page(s) 87-107, ISSN 2299-0984
DOI: 10.2478/popets-2019-0006

Improving Consent in Information Privacy through Autonomy-Preserving Protective Measures (APPMs)

Author(s): L. Jarovsky
Published in: European Data Protection Law Review, Issue 4/4, 2018, Page(s) 447-458, ISSN 2364-2831
DOI: 10.21552/edpl/2018/4/7

Did App Privacy Improve After the GDPR?


Published in: ISSN 1540-7993
DOI: 10.1109/msec.2019.2938445

Engineering Privacy in Smartphone Apps: A Technical Guideline Catalog for App Developers

Author(s): Majid Hatamian
Published in: IEEE Access, Issue 8, 2020, Page(s) 35429-35445, ISSN 2169-3536
DOI: 10.1109/access.2020.2974911

Eliciting Design Guidelines for Privacy Notifications in mHealth Environments

Author(s): Patrick Murmann
Published in: International Journal of Mobile Human Computer Interaction, Issue 11 10.4018/IJMHCI.2019 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJMHCI.2019/4, 2019, Page(s) 66-83, ISSN 1942-390X
DOI: 10.4018/ijmhci.2019100106

Sealed computation: a mechanism to support privacy-aware trustworthy cloud service


Published in: ISSN 2056-4961
DOI: 10.1108/ics-11-2018-0133

Comment on Article 22 and Its Intersection with Obligations for Accessibility

Author(s): G. Anthony Giannoumis; Molly K. Land; Agnieszka Kitkowska; Maria Mikhaylova
Published in: The UN Convention on the Rights of Persons with Disabilities – A Commentary, Issue 2018, 2018
DOI: 10.5281/zenodo.1418451

Towards a Broadening of Privacy Decision-Making Models: The Use of Cognitive Architectures

Author(s): Yefim Shulman
Published in: Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, Issue 526, 2018, Page(s) 187-204
DOI: 10.1007/978-3-319-92925-5_12

Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices

Author(s): Alexandr Railean, Delphine Reinhardt
Published in: Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, Issue 526, 2018, Page(s) 132-149
DOI: 10.1007/978-3-319-92925-5_9

How to Improve the Interaction Design of NFC Payment Terminals?

Author(s): Poornigha Santhana Kumar, Michael Bechinie, Manfred Tscheligi
Published in: Human-Computer Interaction – INTERACT 2019 - 17th IFIP TC 13 International Conference, Paphos, Cyprus, September 2–6, 2019, Proceedings, Part II, Issue 11747, 2019, Page(s) 55-68
DOI: 10.1007/978-3-030-29384-0_4

Is Privacy Controllable?

Author(s): Yefim Shulman, Joachim Meyer
Published in: Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, Issue 547, 2019, Page(s) 222-238
DOI: 10.1007/978-3-030-16744-8_15

A Multilateral Privacy Impact Analysis Method for Android Apps

Author(s): Majid Hatamian, Nurul Momen, Lothar Fritsch, Kai Rannenberg
Published in: Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings, Issue 11498, 2019, Page(s) 87-106
DOI: 10.1007/978-3-030-21752-5_7

ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment

Author(s): Majid Hatamian, Sebastian Pape, Kai Rannenberg
Published in: ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, Issue 562, 2019, Page(s) 165-179
DOI: 10.1007/978-3-030-22312-0_12

Making GDPR Usable: A Model to Support Usability Evaluations of Privacy

Author(s): Johanna Johansen, Simone Fischer-Hübner
Published in: Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, Issue 576, 2020, Page(s) 275-291
DOI: 10.1007/978-3-030-42504-3_18

Fight to Be Forgotten: Exploring the Efficacy of Data Erasure in Popular Operating Systems

Author(s): Andreas Gutmann, Mark Warner
Published in: Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings, Issue 11498, 2019, Page(s) 45-58
DOI: 10.1007/978-3-030-21752-5_4

Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing

Author(s): Lamya Abdullah, Felix Freiling, Juan Quintero, Zinaida Benenson
Published in: Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Issue 11387, 2019, Page(s) 137-152
DOI: 10.1007/978-3-030-12786-2_9

To Be, or Not to Be Notified - Eliciting Privacy Notification Preferences for Online mHealth Services

Author(s): Patrick Murmann, Delphine Reinhardt, Simone Fischer-Hübner
Published in: ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, Issue 562, 2019, Page(s) 209-222
DOI: 10.1007/978-3-030-22312-0_15

NFC Payments – Gaps Between User Perception and Reality

Author(s): Santhana Kumar, Poornigha; Bechinie, Michael; Tscheligi, Manfred
Published in: FIP Summer School on Privacy and Identity Management, Issue 2017, 2018
DOI: 10.5281/zenodo.1485742

Changed the cup, not the saucer – NFC payments in supermarkets

Author(s): Santhana kumar, Poornigha; Bechinie, Michael; Tscheligi, Manfred
Published in: 20th International Conference on Human-Computer Interaction (HCI International 2018), Issue 2018, 2018
DOI: 10.5281/zenodo.1485951