Nudges for privacy and security: Understanding and assisting users' choices online

A Acquisti, I Adjerid, R Balebako… - ACM Computing …, 2017 - dl.acm.org
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …

Exploring how privacy and security factor into IoT device purchase behavior

P Emami-Naeini, H Dixon, Y Agarwal… - Proceedings of the 2019 …, 2019 - dl.acm.org
Despite growing concerns about security and privacy of Internet of Things (IoT) devices,
consumers generally do not have access to security and privacy information when …

A design space for effective privacy notices

F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …

A design space for privacy choices: Towards meaningful privacy control in the internet of things

Y Feng, Y Yao, N Sadeh - Proceedings of the 2021 CHI Conference on …, 2021 - dl.acm.org
“Notice and choice” is the predominant approach for data privacy protection today. There is
considerable user-centered research on providing effective privacy notices but not enough …

Ask the experts: What should be on an IoT privacy and security label?

P Emami-Naeini, Y Agarwal, LF Cranor… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Information about the privacy and security of Internet of Things (IoT) devices is not readily
available to consumers who want to consider it before making purchase decisions. While …

The hidden cost of accommodating crowdfunder privacy preferences: A randomized field experiment

G Burtch, A Ghose, S Wattal - Management Science, 2015 - pubsonline.informs.org
Online crowdfunding has received a great deal of attention as a promising avenue to
fostering entrepreneurship and innovation. Because online settings bring increased visibility …

Privacy as part of the app decision-making process

PG Kelley, LF Cranor, N Sadeh - … of the SIGCHI conference on human …, 2013 - dl.acm.org
Smartphones have unprecedented access to sensitive personal information. While users
report having privacy concerns, they may not actively consider privacy while downloading …

Discovering smart home internet of things privacy norms using contextual integrity

N Apthorpe, Y Shvartzshnaider, A Mathur… - Proceedings of the …, 2018 - dl.acm.org
The proliferation of Internet of Things (IoT) devices for consumer" smart" homes raises
concerns about user privacy. We present a survey method based on the Contextual Integrity …

Measuring user confidence in smartphone security and privacy

E Chin, AP Felt, V Sekar, D Wagner - … of the eighth symposium on usable …, 2012 - dl.acm.org
In order to direct and build an effective, secure mobile ecosystem, we must first understand
user attitudes toward security and privacy for smartphones and how they may differ from …

[ΒΙΒΛΙΟ][B] Personal information management

WP Jones, J Teevan - 2007 - api.taylorfrancis.com
Personal information management (PIM) refers to the practice and the study of the activities
a person performs in order to acquire or create, store, organize, maintain, retrieve, use, and …