Showing 1 - 10 of 26
In this paper we describe the design and evaluation of Anti-Phishing Phil, an online game that teaches users good habits to help them avoid phishing attacks. We used learning science principles to design and iteratively refine the game. We evaluated the game through a user study: participants...
Persistent link: https://www.econbiz.de/10014241531
Many cities are seeking ways to facilitate the deployment of a wireless metropolitan-area network (WiMAN) based on wifi technology. City leaders must often balance competing goals, including the desire to maximize the area in which wireless services will be available, to maximize competition...
Persistent link: https://www.econbiz.de/10014167575
In many Internet commerce applications buyers can easily achieve anonymity, limiting what a seller can learn about any buyer individually. However, because sellers need to keep a fixed web address, buyers can probe them repeatedly or pool their information about sellers with the information...
Persistent link: https://www.econbiz.de/10009476734
Persistent link: https://www.econbiz.de/10013033891
Previous research has suggested that people use the private browsing mode of their web browsers to conduct privacy-sensitive activities online, but have misconceptions about how it works and are likely to overestimate the protections it provides. To better understand how private browsing is used...
Persistent link: https://www.econbiz.de/10014079184
Many websites offer visitors privacy controls and opt-out choices, either to comply with legal requirements or to address consumer privacy concerns. The way these control mechanisms are implemented can significantly affect individuals’ choices and their privacy outcomes. We present an...
Persistent link: https://www.econbiz.de/10014079242
Internet of Things (IoT) devices create new ways through which personal data is collected and processed by service providers. Frequently, end users have little awareness of, and even less control over, these devices’ data collection. IoT Personalized Privacy Assistants (PPAs) can help overcome...
Persistent link: https://www.econbiz.de/10014079245
Despite experts agreeing on many security best practices, there remains a gap between their advice and users’ behavior. One example is the low adoption of secure mobile payments in the United States, despite widespread prevalence of credit and debit card fraud. Prior work has proposed nudging...
Persistent link: https://www.econbiz.de/10014079247
We conducted an in-lab user study with 24 participants to explore the usefulness and usability of privacy choices offered by websites. Participants were asked to find and use choices related to email marketing, targeted advertising, or data deletion on a set of nine websites that differed in...
Persistent link: https://www.econbiz.de/10014079375
Privacy and security tools can help users protect themselves online. Unfortunately, people are often unaware of such tools, and have potentially harmful misconceptions about the protections provided by the tools they know about. Effectively encouraging the adoption of privacy tools requires...
Persistent link: https://www.econbiz.de/10014079376