Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
Counting Carrds: Investigating Personal Disclosure and Boundary Management in Transformative Fandom
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 575, Pages 1–13https://doi.org/10.1145/3613904.3642664The privacy practices of transformative fandom are of interest to HCI researchers both for the community’s high proportion of queer members and for the community’s sophisticated privacy norms and behaviors. We investigated fans’ use of single-serving ...
- research-articleMay 2024
“It's a Fair Game”, or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents
- Zhiping Zhang,
- Michelle Jia,
- Hao-Ping (Hank) Lee,
- Bingsheng Yao,
- Sauvik Das,
- Ada Lerner,
- Dakuo Wang,
- Tianshi Li
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 156, Pages 1–26https://doi.org/10.1145/3613904.3642385The widespread use of Large Language Model (LLM)-based conversational agents (CAs), especially in high-stakes domains, raises many privacy concerns. Building ethical LLM-based CAs that respect user privacy requires an in-depth understanding of the ...
- research-articleApril 2024
Privacy Norms of Transformative Fandom: A Case Study of an Activity-Defined Community
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW1Article No.: 111, Pages 1–29https://doi.org/10.1145/3637388Transformative media fandom is a remarkably coherent, long-lived, and diverse community united primarily by shared engagement in the varied activities of fandom. Its social norms are highly-developed and frequently debated, and have been studied by the ...
- research-articleAugust 2022
Replication: how well do my results generalize now? the external validity of online privacy and security surveys
SOUPS'22: Proceedings of the Eighteenth USENIX Conference on Usable Privacy and SecurityArticle No.: 20, Pages 367–385Privacy and security researchers often rely on data collected through online crowdsourcing platforms such as Amazon Mechanical Turk (MTurk) and Prolific. Prior work--which used data collected in the United States between 2013 and 2017--found that MTurk ...
- discussionJuly 2022
The Buffet Overflow Café
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 20, Issue 4Pages 4–7https://doi.org/10.1109/MSEC.2022.3173122The Buffet Overflow Café is a restaurant for dining cryptographers and cybersecurity professionals.
- research-articleApril 2020
Privacy and Activism in the Transgender Community
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing SystemsPages 1–13https://doi.org/10.1145/3313831.3376339Transgender people are marginalized, facing specific privacy concerns and high risk of online and offline harassment, discrimination, and violence. They also benefit tremendously from technology. We conducted semi-structured interviews with 18 ...
- research-articleOctober 2017
Rewriting History: Changing the Archived Web from the Present
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 1741–1755https://doi.org/10.1145/3133956.3134042The Internet Archive's Wayback Machine is the largest modern web archive, preserving web content since 1996. We discover and analyze several vulnerabilities in how the Wayback Machine archives data, and then leverage these vulnerabilities to create what ...