Showing 1 - 10 of 40
In this paper we describe the design and evaluation of Anti-Phishing Phil, an online game that teaches users good habits to help them avoid phishing attacks. We used learning science principles to design and iteratively refine the game. We evaluated the game through a user study: participants...
Persistent link: https://www.econbiz.de/10014241531
Many cities are seeking ways to facilitate the deployment of a wireless metropolitan-area network (WiMAN) based on wifi technology. City leaders must often balance competing goals, including the desire to maximize the area in which wireless services will be available, to maximize competition...
Persistent link: https://www.econbiz.de/10009440975
Many cities are seeking ways to facilitate the deployment of a wireless metropolitan-area network (WiMAN) based on wifi technology. City leaders must often balance competing goals, including the desire to maximize the area in which wireless services will be available, to maximize competition...
Persistent link: https://www.econbiz.de/10014167575
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some time, low-cost, high-bandwidth Internet connections and peer-to-peer file sharing networks provide highly efficient...
Persistent link: https://www.econbiz.de/10009200022
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have shown that consumers are concerned about online privacy, yet current mechanisms to present website privacy policies...
Persistent link: https://www.econbiz.de/10009441119
Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden phrases. Privacy researchers and industry groups have devised several standardized privacy policy formats to address these...
Persistent link: https://www.econbiz.de/10009441120
Due to the ability of cell phone providers to use cell phone towers to pinpoint users’ locations, federal E911 requirements, the increasing popularity of GPS-capabilities in cellular phones, and the rise of cellular phones for Internet use, a plethora of new applications have been developed...
Persistent link: https://www.econbiz.de/10009441121
Earlier work has shown that consumers cannot effectively find information in privacy policies and that they do not enjoy using them. In our previous research on nutrition labeling and other similar consumer information design processes we developed a standardized table format for privacy...
Persistent link: https://www.econbiz.de/10009441143
Policymakers struggle to determine the proper tradeoffs between data accessibility and data-subject privacy as public records move online. For example, Allegheny County, Pennsylvania recently eliminated the ability to search the county property assessment database using property owners' names....
Persistent link: https://www.econbiz.de/10009441165
We performed a series of in-depth qualitative interviews with 14 subjects who answered advertisements to participate in a university study about Internet advertising. Subjects were not informed this study had to do with behavioral advertising privacy, but raised privacy concerns on their own...
Persistent link: https://www.econbiz.de/10009441168