Skip to main content
European Commission logo
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Privacy and Usability

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Privacy Principles

ESR 2, 5, 10, and 11 will submit a report with privacy principles and protection targets relevant in their respective application domain (by M16). Building on this input, ESRs 6 and 9 submit a report that reflects on whether legal concerns further influence the privacy threats (by M20).

Results of the Fifth Training Event

Report on results of the organized training event at GUF.

Requirements Analysis

Each ESR will contribute to this deliverable with a requirements analysis report for the respective technological artifact to be developed.

Researcher Declarations and Career Development

All ESRs will submit a PhD research proposal and Career Development Plan (devised with their supervisors and co-supervisors) to the Supervisory Board to be approved and to be discussed at the Network-wide Event 3.

The Initial Models

Each ESR will submit a report with a review of the relevant and a detailed specification of the modeling approach that will be taken.

Risk Awareness Creation

ESR 1 takes one or more of the major risks identified and visualizes them for the user. It creates risk awareness through transparency (by M30). ESR 3 submits a report with experimental results of how ownership and risk perceptions change as a result of risk transparency and risk awareness.

Fourth Public Engagement and Dissemination Report

Periodic report summarizing and monitoring the effectiveness of the public engagement activities and the dissemination of the research outputs of all partners.

Refined User Interfaces and User Studies

Each ESR will submit a report presenting the final designs for the user interaction components. In addition, the reports will contain the final evaluation data.

Results of the Fourth Training Event

Report on results of the organized training event at UCL.

Model-based Recommendations

Each ESR will submit a report with additional empirical results and recommendations for system design based on the empirical studies and the model predictions.

Third Public Engagement and Dissemination Report

Periodic report summarizing and monitoring the effectiveness of the public engagement activities and the dissemination of the research outputs of all partners.

The Detailed Models

Each ESR will submit a report presenting the empirical method for validating the model (such as a platform for conducting experiments) and a sufficiently developed model to provide specific predictions. A report will present the model and the method for validation.

Results of the Third Training Event

Report on results of the organized training event at TAU.

Risk Assessment

During a summer school all ESRs jointly engage in risk assessment for the four application domains of ESRs 2, 5, 10 and 11. Major risks are communicated in relevant press and policy channels.

Results of the First Training Event

Report on results of the organized training event at KAU.

Description of Technological Artifacts

This report will present the final descriptions of the technological artifacts to be developed by the ESRs. All WP2 ESRs will contribute to this deliverable.

Ethics

ethic authorisations

First Public Engagement and Dissemination Report

Periodic report summarizing and monitoring the effectiveness of the public engagement activities and the dissemination of the research outputs of all partners.

Technological Artifacts

This final report of WP2 is about the results of the PRIVACY.US technology evaluations, which will provide details about the validity and utility of the individual technological artifacts. Contributions will be made by all WP2 ESRs.

Results of the Sixth Training Event

Report on results of the organized training event at EWT.

Validation Experiments and Results

Each ESR will submit a report presenting the results of the validation experiment and conclusions regarding the model.

Risk Mitigation

ESR 11 reports on how the risks identified for genomic data handling can actually be addressed through appropriate system controls.

User Interface Requirements

Each ESR will submit a report with the user interface requirements for their specific part.

Results of the Second Training Event

Report on results of the organized training event at WU.

Recruitment

A report on the recruitment results from all partners.

Validation Experiment and Results

Each ESR will submit a report presenting the results of the validation experiment and updated user interfaces.

Second Public Engagement and Dissemination Report

Periodic report summarizing and monitoring the effectiveness of the public engagement activities and the dissemination of the research outputs of all partners.

User Interface Designs and Prototypes

Each ESR will submit a report presenting the current user interface concepts and prototypes (mainly low-fidelity) as well as detailed concepts for their evaluation (including study plans).

Supervisory Board of PRIVACY.US

List of members of the supervisory and management boards and the meeting minutes and of the supervisory board.

Progress Report

Annual reports for the consortium management, performance monitoring, and administrative and financial coordination.

Draft Periodic Report

Annual reports for the consortium management, performance monitoring, and administrative and financial coordination.

Veröffentlichungen

Facilitating Privacy Attitudes and Behaviors with Affective Visual Design

Autoren: Agnieszka Kitkowska, Yefim Shulman, Leonardo A. Martucci, Erik Wästlund
Veröffentlicht in: ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21–23, 2020, Proceedings, Ausgabe 580, 2020, Seite(n) 109-123, ISBN 978-3-030-58200-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-58201-2_8

Comment on Article 22 and Its Intersection with Obligations for Accessibility

Autoren: G. Anthony Giannoumis; Molly K. Land; Agnieszka Kitkowska; Maria Mikhaylova
Veröffentlicht in: The UN Convention on the Rights of Persons with Disabilities – A Commentary, Ausgabe 2018, 2018
Herausgeber: Oxford Commentaries on International Law
DOI: 10.5281/zenodo.1418451

Towards a Broadening of Privacy Decision-Making Models: The Use of Cognitive Architectures

Autoren: Yefim Shulman
Veröffentlicht in: Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, Ausgabe 526, 2018, Seite(n) 187-204, ISBN 978-3-319-92924-8
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-92925-5_12

Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices

Autoren: Alexandr Railean, Delphine Reinhardt
Veröffentlicht in: Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, Ausgabe 526, 2018, Seite(n) 132-149, ISBN 978-3-319-92924-8
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-92925-5_9

How to Improve the Interaction Design of NFC Payment Terminals?

Autoren: Poornigha Santhana Kumar, Michael Bechinie, Manfred Tscheligi
Veröffentlicht in: Human-Computer Interaction – INTERACT 2019 - 17th IFIP TC 13 International Conference, Paphos, Cyprus, September 2–6, 2019, Proceedings, Part II, Ausgabe 11747, 2019, Seite(n) 55-68, ISBN 978-3-030-29383-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-29384-0_4

Is Privacy Controllable?

Autoren: Yefim Shulman, Joachim Meyer
Veröffentlicht in: Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, Ausgabe 547, 2019, Seite(n) 222-238, ISBN 978-3-030-16743-1
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-16744-8_15

A Multilateral Privacy Impact Analysis Method for Android Apps

Autoren: Majid Hatamian, Nurul Momen, Lothar Fritsch, Kai Rannenberg
Veröffentlicht in: Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings, Ausgabe 11498, 2019, Seite(n) 87-106, ISBN 978-3-030-21751-8
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-21752-5_7

ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment

Autoren: Majid Hatamian, Sebastian Pape, Kai Rannenberg
Veröffentlicht in: ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, Ausgabe 562, 2019, Seite(n) 165-179, ISBN 978-3-030-22311-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-22312-0_12

Fight to Be Forgotten: Exploring the Efficacy of Data Erasure in Popular Operating Systems

Autoren: Andreas Gutmann, Mark Warner
Veröffentlicht in: Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings, Ausgabe 11498, 2019, Seite(n) 45-58, ISBN 978-3-030-21751-8
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-21752-5_4

Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing

Autoren: Lamya Abdullah, Felix Freiling, Juan Quintero, Zinaida Benenson
Veröffentlicht in: Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Ausgabe 11387, 2019, Seite(n) 137-152, ISBN 978-3-030-12785-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-12786-2_9

To Be, or Not to Be Notified - Eliciting Privacy Notification Preferences for Online mHealth Services

Autoren: Patrick Murmann, Delphine Reinhardt, Simone Fischer-Hübner
Veröffentlicht in: ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, Ausgabe 562, 2019, Seite(n) 209-222, ISBN 978-3-030-22311-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-22312-0_15

Order of Control and Perceived Control over Personal Information

Autoren: Yefim Shulman, Thao Ngo, Joachim Meyer
Veröffentlicht in: Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, Ausgabe 576, 2020, Seite(n) 359-375, ISBN 978-3-030-42503-6
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-42504-3_23

Psychological Effects and Their Role in Online Privacy Interactions: A Review

Autoren: Agnieszka Kitkowska, Yefim Shulman, Leonardo A. Martucci, Erik Wastlund
Veröffentlicht in: IEEE Access, Ausgabe 8, 2020, Seite(n) 21236-21260, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2020.2969562

Tools for Achieving Usable Ex Post Transparency: A Survey

Autoren: Patrick Murmann, Simone Fischer-Hubner
Veröffentlicht in: IEEE Access, Ausgabe 5, 2017, Seite(n) 22965-22991, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2017.2765539

Vertrauenswürdiges Backend

Autoren: Hubert A. Jäger, Lamya Abdullah, Juan Quintero
Veröffentlicht in: Datenschutz und Datensicherheit - DuD, Ausgabe 41/12, 2017, Seite(n) 729-734, ISSN 1614-0702
Herausgeber: Springer
DOI: 10.1007/s11623-017-0868-y

Revealing the unrevealed: Mining smartphone users privacy perception on app markets

Autoren: Majid Hatamian, Jetzabel Serna, Kai Rannenberg
Veröffentlicht in: Computers & Security, Ausgabe 83, 2019, Seite(n) 332-353, ISSN 0167-4048
Herausgeber: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.02.010

"""I feel like only half a man"""

Autoren: Dilisha Patel, Ann Blandford, Mark Warner, Jill Shawe, Judith Stephenson
Veröffentlicht in: Proceedings of the ACM on Human-Computer Interaction, Ausgabe 3/CSCW, 2019, Seite(n) 1-20, ISSN 2573-0142
Herausgeber: ACM
DOI: 10.1145/3359184

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective

Autoren: Alexandros Mittos, Bradley Malin, Emiliano De Cristofaro
Veröffentlicht in: Proceedings on Privacy Enhancing Technologies, Ausgabe 2019/1, 2019, Seite(n) 87-107, ISSN 2299-0984
Herausgeber: Sciendo
DOI: 10.2478/popets-2019-0006

Improving Consent in Information Privacy through Autonomy-Preserving Protective Measures (APPMs)

Autoren: L. Jarovsky
Veröffentlicht in: European Data Protection Law Review, Ausgabe 4/4, 2018, Seite(n) 447-458, ISSN 2364-2831
Herausgeber: EDPL
DOI: 10.21552/edpl/2018/4/7

Did App Privacy Improve After the GDPR?

Autoren: Nurul Momen, Majid Hatamian, Lothar Fritsch
Veröffentlicht in: IEEE Security & Privacy, Ausgabe 17/6, 2019, Seite(n) 10-20, ISSN 1540-7993
Herausgeber: IEEE Computer Society
DOI: 10.1109/msec.2019.2938445

Engineering Privacy in Smartphone Apps: A Technical Guideline Catalog for App Developers

Autoren: Majid Hatamian
Veröffentlicht in: IEEE Access, Ausgabe 8, 2020, Seite(n) 35429-35445, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2020.2974911

Eliciting Design Guidelines for Privacy Notifications in mHealth Environments

Autoren: Patrick Murmann
Veröffentlicht in: International Journal of Mobile Human Computer Interaction, Ausgabe 11 10.4018/IJMHCI.2019 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJMHCI.2019/4, 2019, Seite(n) 66-83, ISSN 1942-390X
Herausgeber: The Information Resources Management Association (IRMA)
DOI: 10.4018/ijmhci.2019100106

Sealed computation: a mechanism to support privacy-aware trustworthy cloud service

Autoren: Lamya Abdullah, Juan Quintero
Veröffentlicht in: Information & Computer Security, Ausgabe 27/5, 2019, Seite(n) 601-620, ISSN 2056-4961
Herausgeber: Emerald
DOI: 10.1108/ics-11-2018-0133

Analyzing Genetic Testing Discourse on the Web Through the Lens of Twitter, Reddit, and 4chan

Autoren: Alexandros Mittos, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro
Veröffentlicht in: ACM Transactions on the Web, Ausgabe 14/4, 2020, Seite(n) 1-38, ISSN 1559-1131
Herausgeber: Association for Computing Machinary, Inc.
DOI: 10.1145/3404994

Understanding Usability and User Acceptance of Usage-Based Insurance from Users' View

Autoren: Juan Quintero and Zinaida Benenson
Veröffentlicht in: 2nd International Conference on Machine Learning and Machine Intelligence (MLMI 2019), 2019
Herausgeber: ACM

Beacon Alarming: Informed decision-making supporter and privacy risk analyser in Smartphone applications

Autoren: Majid Hatamian, Jetzabel Serna-Olvera
Veröffentlicht in: 2017 IEEE International Conference on Consumer Electronics (ICCE), 2017, Seite(n) 468-471, ISBN 978-1-5090-5544-9
Herausgeber: IEEE
DOI: 10.1109/ICCE.2017.7889399

FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps

Autoren: Majid Hatamian, Jetzabel Serna, Kai Rannenberg, Bodo Igler
Veröffentlicht in: International Conference On Trust, Privacy & Security In Digital Business (TrustBus 2017), 2017, Seite(n) 3-18
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-64483-7_1

Is It Harmful? Measuring People's Perceptions of Online Privacy Issues

Autoren: Kitkowska, Agnieszka; Meyer, Joachim; Wästlund, Erik; Martucci, Leonardo
Veröffentlicht in: Posters -- 13th Symposium on Usable Privacy and Security (SOUPS 2017), 2017
Herausgeber: Usenix
DOI: 10.5281/zenodo.1117769

ARM: ANN-based ranking model for privacy and security analysis in smartphone ecosystems

Autoren: Majid Hatamian, Jetzabel Serna
Veröffentlicht in: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Seite(n) 1-6, ISBN 978-1-5386-1585-0
Herausgeber: IEEE
DOI: 10.1109/CCST.2017.8167854

Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr

Autoren: Warner, M.; Gutmann, A.; Sasse, M. A.; Blandford, A.
Veröffentlicht in: ACM Conference on Computer-Supported Cooperative Work and Social Computing, Ausgabe 2018, 2018
Herausgeber: ACM

A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications

Autoren: Harborth, David; Hatamian, Majid; Tesfay, Welderufael B.; Rannenberg, Kai
Veröffentlicht in: 52nd Hawaii International Conference on System Sciences, Ausgabe HICSS, 2019
Herausgeber: AIS Electronic Library (AISeL)
DOI: 10.5281/zenodo.1484307

Let there be LITE - design and evaluation of a label for IoT transparency enhancement

Autoren: Alexandr Railean, Delphine Reinhardt
Veröffentlicht in: Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct - MobileHCI '18, 2018, Seite(n) 103-110, ISBN 9781-450359412
Herausgeber: ACM Press
DOI: 10.1145/3236112.3236126

Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios

Autoren: Volkamer, M.; Gutmann, A.; Renaud, K.; Gerber, P.; Mayer, P.
Veröffentlicht in: Proceedings of the Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), Ausgabe 2018, 2018
Herausgeber: USENIX Association

Is It Harmful? Re-examining Privacy Concerns

Autoren: Kitkowska, Agnieszka; Meyer, Joachim; Wästlund, Erik; Martucci, Leonardo A.
Veröffentlicht in: IFIP Summer School on Privacy and Identity Management, Ausgabe 2017, 2018
Herausgeber: Springer
DOI: 10.5281/zenodo.1297340

ARM: ANN-based ranking model for privacy and security analysis in smartphone ecosystems

Autoren: Hatamian, Majid; Serna, Jetzabel
Veröffentlicht in: IEEE International Carnahan Conference on Security Technology (ICCST 2017), Ausgabe 2017, 2017
Herausgeber: IEEE
DOI: 10.5281/zenodo.1484336

"""23andMe confirms: I'm super white"" -- Analyzing Twitter Discourse On Genetic Testing"

Autoren: Mittos, Alexandros; Blackburn, Jeremy; De Cristofaro, Emiliano
Veröffentlicht in: 5th International Workshop on ​Genome Privacy and Security (GenoPri’18), Ausgabe 2018, 2018
Herausgeber: GenoPri

Do I Really Have To Publicly Disclose My HIV Status?

Autoren: Warner, M.; Blandford, A.
Veröffentlicht in: CHI ’18 Workshop: Moving beyond a “one-size fits all” approach: Exploring Individual Differences in Privacy, Montreal, Canada. (2018), Ausgabe 2018, 2018
Herausgeber: ACM

Reaching Beyond Borders: Investigating Differences in Privacy Harms Concerns

Autoren: Agnieszka Kitkowska
Veröffentlicht in: CHI Workshop “Moving Beyond a One-Size Fits All Approach: Exploring Individual Differences in Privacy, Ausgabe 2018, 2018
Herausgeber: ACM
DOI: 10.5281/zenodo.1265726

"""It's shocking!"": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser"

Autoren: Hatamian, Majid; Kitkowska, Agnieszka; Korunovska, Jana; Kirrane, Sabrina
Veröffentlicht in: 32nd Annual Conference on Data and Applications Security and Privacy (DBSec 2018)., Ausgabe 2018, 2018
Herausgeber: Springer
DOI: 10.5281/zenodo.1261200

Signal Appropriation of Explicit HIV Status Disclosure Fields in Sex-Social Apps used by Gay and Bisexual Men

Autoren: Mark Warner, Juan F. Maestre, Jo Gibbs, Chia-Fang Chung, Ann Blandford
Veröffentlicht in: ACM CHI Conference on Human Factors in Computing Systems (CHI 2019), Ausgabe 2019, 2019
Herausgeber: ACM
DOI: 10.1145/3290605.3300922

Usable transparency for enhancing privacy in mobile health apps

Autoren: Patrick Murmann
Veröffentlicht in: Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct - MobileHCI '18, 2018, Seite(n) 440-442, ISBN 9781-450359412
Herausgeber: ACM Press
DOI: 10.1145/3236112.3236184

Taken Out of Context: Security Risks with Security Code AutoFill in iOS & macOS

Autoren: Gutmann, A.; Murdoch, S. J.
Veröffentlicht in: In: Proceedings of Who Are You?! Adventures in Authentication Workshop (WAY 2019). USENIX: Santa Clara, CA, USA. (2019) (In press)., Ausgabe 1, 2019
Herausgeber: Usenix

(In)escapable Affect? Exploring Factors Influencing Privacy-Related Behavioral Intentions

Autoren: Agnieszka Kitkowska, Erik Wästlund, Leonardo A. Martucci
Veröffentlicht in: Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020, ISBN 978-0-9981331-3-3
Herausgeber: Hawaii International Conference on System Sciences
DOI: 10.24251/hicss.2020.503

Evaluating 'Prefer not to say' Around Sensitive Disclosures

Autoren: Mark Warner, Agnieszka Kitkowska, Jo Gibbs, Juan F. Maestre, Ann Blandford
Veröffentlicht in: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, Seite(n) 1-13, ISBN 9781-450367080
Herausgeber: ACM
DOI: 10.1145/3313831.3376150

"""Hard to understand, easy to ignore:"" an automated approach to predict mobile app permission requests - student research abstract"

Autoren: Majid Hatamian
Veröffentlicht in: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019, Seite(n) 1979-1982, ISBN 9781-450359337
Herausgeber: ACM
DOI: 10.1145/3297280.3297660

Achieving Consistency of Software Updates against Strong Attackers

Autoren: Lamya Abdullah, Sebastian Hahn, Felix Freiling
Veröffentlicht in: Proceedings of the Third Central European Cybersecurity Conference on - CECC 2019, 2019, Seite(n) 1-6, ISBN 9781-450372961
Herausgeber: ACM Press
DOI: 10.1145/3360664.3360670

“And We Will Fight for Our Race!” A Measurement Study of Genetic Testing Conversations on Reddit and 4chan

Autoren: Alexandros Mittos, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro
Veröffentlicht in: Proceedings of the International AAAI Conference on Web and Social Media, Ausgabe 14, 2020, Seite(n) 452-463
Herausgeber: AAAI

Moments of Truth with Conversational Agents: An Exploratory Quest for the Relevant Experiences of Alexa Users

Autoren: Esther Görnemann and Sarah Spiekermann-Hoff
Veröffentlicht in: European Conference on Information Systems (ECIS2020), 2020, ISBN 978-1-7336325-1-5
Herausgeber: AIS Association for Information Systems

Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect

Autoren: Kitkowska, Agnieszka; Warner, Mark; Shulman, Yefim; Wästlund, Erik; Martucci, Leonardo
Veröffentlicht in: SOUPS'20: Proceedings of the Sixteenth USENIX Conference on Usable Privacy and Security August 2020, Ausgabe 1, 2020
Herausgeber: Usenix
DOI: 10.5281/zenodo.3980478

NFC Payments – Gaps Between User Perception and Reality

Autoren: Santhana Kumar, Poornigha; Bechinie, Michael; Tscheligi, Manfred
Veröffentlicht in: FIP Summer School on Privacy and Identity Management, Ausgabe 2017, 2018
Herausgeber: Springer
DOI: 10.5281/zenodo.1485742

Changed the cup, not the saucer – NFC payments in supermarkets

Autoren: Santhana kumar, Poornigha; Bechinie, Michael; Tscheligi, Manfred
Veröffentlicht in: 20th International Conference on Human-Computer Interaction (HCI International 2018), Ausgabe 2018, 2018
Herausgeber: Springer
DOI: 10.5281/zenodo.1485951

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor