Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2017
How Do System Administrators Resolve Access-Denied Issues in the Real World?
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 348–361https://doi.org/10.1145/3025453.3025999The efficacy of access control largely depends on how system administrators (sysadmins) resolve access-denied issues. A correct resolution should only permit the expected access, while maintaining the protection against illegal access. However, ...
- research-articleMay 2017
Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 906–918https://doi.org/10.1145/3025453.3025961With the rapid growth of ICT adoption in the Global South, crimes over and through digital technologies have also increased. Consequently, governments have begun to undertake a variety of different surveillance programs, which in turn provoke questions ...
- research-articleMay 2017
Money, God, and SMS: Explorations in Supporting Social Action Through a Bangladeshi Mosque
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 5941–5953https://doi.org/10.1145/3025453.3025960Religious institutions hold a significant place in daily life for the vast majority of people in the world, especially in developing countries. Yet despite their social prominence, and despite HCI's emphasis on the social context of technology, ...
- research-articleMay 2017
Was my message read?: Privacy and Signaling on Facebook Messenger
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 3838–3842https://doi.org/10.1145/3025453.3025925Major online messaging services such as Facebook Messenger and WhatsApp are starting to provide users with real-time information about when people read their messages, while useful, the feature has the potential to negatively impact privacy as well as ...
- research-articleMay 2017
A City in Common: A Framework to Orchestrate Large-scale Citizen Engagement around Urban Issues
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 2282–2294https://doi.org/10.1145/3025453.3025915Citizen sensing is an approach that develops and uses lightweight technologies with local communities to collect, share and act upon data. In doing so it enables them to become more aware of how they can tackle local issues. We report here on the ...
- research-articleMay 2017Best Paper
Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse
- Tara Matthews,
- Kathleen O'Leary,
- Anna Turner,
- Manya Sleeper,
- Jill Palzkill Woelfer,
- Martin Shelton,
- Cori Manthorne,
- Elizabeth F. Churchill,
- Sunny Consolvo
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 2189–2201https://doi.org/10.1145/3025453.3025875We present a qualitative study of the digital privacy and security motivations, practices, and challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for organizing survivors' technology practices and challenges into ...
- research-articleMay 2017
Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing
- Daniela Oliveira,
- Harold Rocha,
- Huizi Yang,
- Donovan Ellis,
- Sandeep Dommaraju,
- Melis Muradoglu,
- Devon Weir,
- Adam Soliman,
- Tian Lin,
- Natalie Ebner
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 6412–6424https://doi.org/10.1145/3025453.3025831Spear phishing emails are key in many cyber attacks. Successful emails employ psychological weapons of influence and relevant life domains. This paper investigates spear phishing susceptibility as a function of Internet user age (old vs young), weapon ...
- research-articleMay 2017
Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 5197–5207https://doi.org/10.1145/3025453.3025735Hello Barbie, CogniToys Dino, and Amazon Echo are part of a new wave of connected toys and gadgets for the home that listen. Unlike the smartphone, these devices are always on, blending into the background until needed. We conducted interviews with ...
- research-articleMay 2017
Can Unicorns Help Users Compare Crypto Key Fingerprints?
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 3787–3798https://doi.org/10.1145/3025453.3025733Many authentication schemes ask users to manually compare compact representations of cryptographic keys, known as fingerprints. If the fingerprints do not match, that may signal a man-in-the-middle attack. An adversary performing an attack may use a ...
- research-articleMay 2017
Towards Understanding Differential Privacy: When Do People Trust Randomized Response Technique?
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 3833–3837https://doi.org/10.1145/3025453.3025698As a consequence of living in a data ecosystem, we often relinquish personal information to be used in contexts in which we have no control. In this paper, we begin to examine the usability of differential privacy, a mechanism that proposes to promise ...
- research-articleMay 2017
Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 3821–3832https://doi.org/10.1145/3025453.3025668Items in social media such as photos may be co-owned by multiple users, i.e., the sharing decisions of the ones who upload them have the potential to harm the privacy of the others. Previous works uncovered coping strategies by co-owners to manage their ...
- research-articleMay 2017
Understanding Shoulder Surfing in the Wild: Stories from Users and Observers
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 4254–4265https://doi.org/10.1145/3025453.3025636Research has brought forth a variety of authentication systems to mitigate observation attacks. However, there is little work about shoulder surfing situations in the real world. We present the results of a user survey (N=174) in which we investigate ...
- research-articleMay 2017
Technologies and Social Justice Outcomes in Sex Work Charities: Fighting Stigma, Saving Lives
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 3352–3364https://doi.org/10.1145/3025453.3025615Sex workers' rights are human rights, and as such are an issue inherently based in social, criminal, and political justice debates. As HCI continues to move towards feminist and social justice oriented research and design approaches, we argue that we ...
- research-articleMay 2017Honorable Mention
Gender-Inclusiveness Personas vs. Stereotyping: Can We Have it Both Ways?
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 6658–6671https://doi.org/10.1145/3025453.3025609Personas often aim to improve product designers' ability to "see through the eyes of" target users through the empathy personas can inspire - but personas are also known to promote stereotyping. This tension can be particularly problematic when personas ...
- research-articleMay 2017
Better the Devil You Know: Exposing the Data Sharing Practices of Smartphone Apps
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 5208–5220https://doi.org/10.1145/3025453.3025556Most users of smartphone apps remain unaware of what data about them is being collected, by whom, and how these data are being used. In this mixed methods investigation, we examine the question of whether revealing key data collection practices of ...
- research-articleMay 2017
High Costs and Small Benefits: A Field Study of How Users Experience Operating System Upgrades
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 4242–4253https://doi.org/10.1145/3025453.3025509Users must manage frequent software and operating system upgrades across multiple computing devices. While current research focuses primarily on the security aspect, we investigate the user's perspective of upgrading software. Our first study (n=65) ...
- research-articleMay 2017Honorable Mention
Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 3751–3763https://doi.org/10.1145/3025453.3025461PINs and patterns remain among the most widely used knowledge-based authentication schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of threat to user privacy on mobile devices. Thermal cameras allow performing thermal ...