Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Privacy Concerns of Student Data Shared with Instructors in an Online Learning Management System
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 661, Pages 1–16https://doi.org/10.1145/3613904.3642914Learning management systems are used for facilitating communication between instructors and students, dissemination of lecture materials, and grading of assignments. They collect large amounts of student data, necessary or otherwise, with or without ...
"I Know I'm Being Observed:" Video Interventions to Educate Users about Targeted Advertising on Facebook
- Garrett Smith,
- Sarah Carson,
- Rhea G Vengurlekar,
- Stephanie Morales,
- Yun-Chieh Tsai,
- Rachel George,
- Josh Bedwell,
- Trevor Jones,
- Mainack Mondal,
- Brian Smith,
- Norman Makoto Su,
- Bart Knijnenburg,
- Xinru Page
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 112, Pages 1–27https://doi.org/10.1145/3613904.3642885Recent work explores how to educate and encourage users to protect their online privacy. We tested the efficacy of short videos for educating users about targeted advertising on Facebook. We designed a video that utilized an emotional appeal to explain ...
- research-articleMay 2024
Expanding Concepts of Non-Consensual Image-Disclosure Abuse: A Study of NCIDA in Pakistan
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 398, Pages 1–17https://doi.org/10.1145/3613904.3642871Non-Consensual Image-Disclosure Abuse (NCIDA) represents a subset of technology-facilitated sexual abuse where imagery and video with romantic or sexual connotations are used to control, extort, and otherwise harm victims. Despite considerable research ...
- research-articleMay 2024
Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 826, Pages 1–60https://doi.org/10.1145/3613904.3642843Two popular approaches for helping consumers avoid phishing threats are phishing awareness videos and tools supporting users in identifying phishing emails. Awareness videos and tools have each been shown on their own to increase people’s phishing ...
Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter
- Juliane Schmüser,
- Harshini Sri Ramulu,
- Noah Wöhler,
- Christian Stransky,
- Felix Bensmann,
- Dimitar Dimitrov,
- Sebastian Schellhammer,
- Dominik Wermke,
- Stefan Dietze,
- Yasemin Acar,
- Sascha Fahl
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 574, Pages 1–16https://doi.org/10.1145/3613904.3642826The Russian Invasion of Ukraine in 2022 resulted in a rapidly changing cyber threat environment globally and incentivized the sharing of security and privacy advice on social media. Previous research found a strong impact of online security advice on end-...
-
- research-articleMay 2024
Uncovering Human Traits in Determining Real and Spoofed Audio: Insights from Blind and Sighted Individuals
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 949, Pages 1–14https://doi.org/10.1145/3613904.3642817This paper explores how blind and sighted individuals perceive real and spoofed audio, highlighting differences and similarities between the groups. Through two studies, we find that both groups focus on specific human traits in audio–such as accents, ...
- research-articleMay 2024Best Paper
Sensible and Sensitive AI for Worker Wellbeing: Factors that Inform Adoption and Resistance for Information Workers
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 104, Pages 1–30https://doi.org/10.1145/3613904.3642716Algorithmic estimations of worker behavior are gaining popularity. Passive Sensing–enabled AI (PSAI) systems leverage behavioral traces from workers’ digital tools to infer their experience. Despite their conceptual promise, the practical designs of ...
- research-articleMay 2024
“That’s Kind of Sus(picious)”: The Comprehensiveness of Mental Health Application Users’ Privacy and Security Concerns
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 789, Pages 1–16https://doi.org/10.1145/3613904.3642705With the increasing usage of mental health applications (MHAs), there is growing concern regarding their data privacy practices. Analyzing 437 user reviews from 83 apps, we outline users’ predominant privacy and security concerns with currently ...
- research-articleMay 2024
Counting Carrds: Investigating Personal Disclosure and Boundary Management in Transformative Fandom
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 575, Pages 1–13https://doi.org/10.1145/3613904.3642664The privacy practices of transformative fandom are of interest to HCI researchers both for the community’s high proportion of queer members and for the community’s sophisticated privacy norms and behaviors. We investigated fans’ use of single-serving ...
- research-articleMay 2024
Personalizing Privacy Protection With Individuals' Regulatory Focus: Would You Preserve or Enhance Your Information Privacy?
- Reza Ghaiumy Anaraky,
- Yao Li,
- Hichang Cho,
- Danny Yuxing Huang,
- Kaileigh Angela Byrne,
- Bart Knijnenburg,
- Oded Nov
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 982, Pages 1–17https://doi.org/10.1145/3613904.3642640In this study, we explore the effectiveness of persuasive messages endorsing the adoption of a privacy protection technology (IoT Inspector) tailored to individuals’ regulatory focus (promotion or prevention). We explore if and how regulatory fit (i.e., ...
- research-articleMay 2024
Out-of-Device Privacy Unveiled: Designing and Validating the Out-of-Device Privacy Scale (ODPS)
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 793, Pages 1–15https://doi.org/10.1145/3613904.3642623This paper proposes an Out-of-Device Privacy Scale (ODPS) - a reliable, validated psychometric privacy scale that measures users’ importance of out-of-device privacy. In contrast to existing scales, ODPS is designed to capture the importance individuals ...
- research-articleMay 2024
Measuring Compliance with the California Consumer Privacy Act Over Space and Time
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 785, Pages 1–19https://doi.org/10.1145/3613904.3642597The widespread sharing of consumers’ personal information with third parties raises significant privacy concerns. The California Consumer Privacy Act (CCPA) mandates that online businesses offer consumers the option to opt out of the sale and sharing of ...
- research-articleMay 2024
Exposed or Erased: Algorithmic Censorship of Nudity in Art
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 26, Pages 1–17https://doi.org/10.1145/3613904.3642586The intersection between art and technology poses new challenges for creative expression in the digital space. This paper investigates the algorithmic censorship of artistic nudity in social platforms by means of a qualitative study via semi-structured ...
- research-articleMay 2024
On the Feasibility of Predicting Users' Privacy Concerns using Contextual Labels and Personal Preferences
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 792, Pages 1–20https://doi.org/10.1145/3613904.3642500Predicting users’ privacy concerns is challenging due to privacy’s subjective and complex nature. Previous research demonstrated that generic attitudes, such as those captured by Westin’s Privacy Segmentation Index, are inadequate predictors of context-...
- research-articleMay 2024
Teaching Middle Schoolers about the Privacy Threats of Tracking and Pervasive Personalization: A Classroom Intervention Using Design-Based Research
- Sushmita Khan,
- Mehtab Iqbal,
- Oluwafemi Osho,
- Khushbu Singh,
- Kyra Derrick,
- Philip Nelson,
- Lingyuan Li,
- Emily Sidnam-Mauch,
- Nicole Bannister,
- Kelly Caine,
- Bart Knijnenburg
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 679, Pages 1–26https://doi.org/10.1145/3613904.3642460With the pervasive and evolving use of tracking and AI to make inferences about online platform users, it has become imperative for adolescents—a key demographic using such platforms—to develop a deep understanding of these practices to protect their ...
- research-articleMay 2024
Not as easy as just update: Survey of System Administrators and Patching Behaviours
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 972, Pages 1–17https://doi.org/10.1145/3613904.3642456Patching software theoretically leads to improvements including security critical changes, but it can also lead to new issues. For System Administrators (sysadmins) new issues can negatively impact operations at their organization. While mitigation ...
- research-articleMay 2024
Sharenting on TikTok: Exploring Parental Sharing Behaviors and the Discourse Around Children’s Online Privacy
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 114, Pages 1–17https://doi.org/10.1145/3613904.3642447Since the inception of social media, parents have been sharing information about their children online. Unfortunately, this “sharenting” can expose children to several online and offline risks. Although researchers have studied sharenting on multiple ...
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 973, Pages 1–32https://doi.org/10.1145/3613904.3642432Amidst growing IT security challenges, psychological underpinnings of security behaviors have received considerable interest, e.g. cybersecurity Self-Efficacy (SE), the belief in one’s own ability to enact cybersecurity-related skills. Due to diverging ...
“Our Users' Privacy is Paramount to Us”: A Discourse Analysis of How Period and Fertility Tracking App Companies Address the Roe v Wade Overturn
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 816, Pages 1–21https://doi.org/10.1145/3613904.3642384After the overturn of Roe v. Wade gave states the license to ban abortion, numerous people in US have grown to worry about privacy in using period and fertility tracking apps. To address these concerns, some app companies have issued public statements to ...
- research-articleMay 2024
Non-Consensual Synthetic Intimate Imagery: Prevalence, Attitudes, and Knowledge in 10 Countries
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 779, Pages 1–20https://doi.org/10.1145/3613904.3642382Deepfake technologies have become ubiquitous, “democratizing” the ability to manipulate photos and videos. One popular use of deepfake technology is the creation of sexually explicit content, which can then be posted and shared widely on the internet. ...