Security and privacy in big data life cycle: a survey and open challenges

J Koo, G Kang, YG Kim - Sustainability, 2020 - mdpi.com
The use of big data in various fields has led to a rapid increase in a wide variety of data
resources, and various data analysis technologies such as standardized data mining and …

End user security and privacy concerns with smart homes

E Zeng, S Mare, F Roesner - … symposium on usable privacy and security …, 2017 - usenix.org
The Internet of Things is becoming increasingly widespread in home environments.
Consumers are transforming their homes into smart homes, with internet-connected sensors …

Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness

A Soumelidou, A Tsohou - Telematics and Informatics, 2021 - Elsevier
In today's Internet reliant services, the issue of users' information privacy awareness is being
raised. Despite the fact that in many cases internet users claim to be cognizant of privacy …

Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders

D Freed, J Palmer, DE Minchala, K Levy… - Proceedings of the …, 2017 - dl.acm.org
Digital technologies, including mobile devices, cloud computing services, and social
networks, play a nuanced role in intimate partner violence (IPV) settings, including domestic …

Recon: Revealing and controlling pii leaks in mobile network traffic

J Ren, A Rao, M Lindorfer, A Legout… - Proceedings of the 14th …, 2016 - dl.acm.org
It is well known that apps running on mobile devices extensively track and leak users'
personally identifiable information (PII); however, these users have little visibility into PII …

Stories from survivors: Privacy & security practices when co** with intimate partner abuse

T Matthews, K O'Leary, A Turner, M Sleeper… - Proceedings of the …, 2017 - dl.acm.org
We present a qualitative study of the digital privacy and security motivations, practices, and
challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for …

[LIVRE][B] Mobile interfaces in public spaces: Locational privacy, control, and urban sociability

AS e Silva, J Frith - 2012 - taylorfrancis.com
Mobile phones are no longer what they used to be. Not only can users connect to the
Internet anywhere and anytime, they can also use their devices to map their precise …

" Little brothers watching you" raising awareness of data leaks on smartphones

R Balebako, J Jung, W Lu, LF Cranor… - Proceedings of the Ninth …, 2013 - dl.acm.org
Today's smartphone applications expect users to make decisions about what information
they are willing to share, but fail to provide sufficient feedback about which privacy-sensitive …

TimeAware: Leveraging framing effects to enhance personal productivity

YH Kim, JH Jeon, EK Choe, B Lee, KH Kim… - Proceedings of the 2016 …, 2016 - dl.acm.org
To help people enhance their personal productivity by providing effective feedback, we
designed and developed TimeAware, a self-monitoring system for capturing and reflecting …

" Is My Phone Hacked?" Analyzing Clinical Computer Security Interventions With Survivors of Intimate Partner Violence

D Freed, S Havron, E Tseng, A Gallardo… - Proceedings of the …, 2019 - dl.acm.org
Intimate partner abusers use technology to track, monitor, harass, and otherwise harm their
victims, and prior work reports that victims have few resources for obtaining help with such …