Vision: too little too late? do the risks of femtech already outweigh the benefits?

M Mehrnezhad, L Shipp, T Almeida… - Proceedings of the 2022 …, 2022 - dl.acm.org
Female-oriented technologies (FemTech) promise to enable women to take control of their
bodies and lives, hel** them overcome the many existing challenges in medical care and …

A US-UK usability evaluation of consent management platform cookie consent interface design on desktop and mobile

ER Bouma-Sims, M Li, Y Lin… - Proceedings of the …, 2023 - dl.acm.org
Websites implement cookie consent interfaces to obtain users' permission to use non-
essential cookies, as required by privacy regulations. We extend prior research evaluating …

[HTML][HTML] Evolution of web tracking protection in Chrome

R Pan, A Ruiz-Martínez - Journal of Information Security and Applications, 2023 - Elsevier
In our society, protecting users' privacy is of utmost importance, especially when users
access websites. Increased awareness of privacy concerns has led web browsers to …

“My sex-related data is more sensitive than my financial data and I want the same level of security and privacy\": User Risk Perceptions and Protective Actions in …

M Mehrnezhad, T Almeida - … of the 2023 European Symposium on …, 2023 - dl.acm.org
The digitalization of the reproductive body has engaged myriads of cutting-edge
technologies in supporting people to know and tackle their intimate health. Generally …

"{Un-Equal} Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns

KPL Coopamootoo, M Ng - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
There are indications in literature that women do not engage with security and privacy (SP)
technologies, meant to keep them safe online, in the same way as men do. To better …

Mind the FemTech gap: regulation failings and exploitative systems

M Mehrnezhad, T Van Der Merwe… - Frontiers in the Internet of …, 2024 - frontiersin.org
The security, privacy, and safety issues around Female-oriented technologies (FemTech)
and data can lead to differential harms. These complex risks and harms are enabled by …

Invisible, unreadable, and inaudible cookie notices: An evaluation of cookie notices for users with visual impairments

JM Clarke, M Mehrnezhad, E Toreini - ACM transactions on accessible …, 2024 - dl.acm.org
This article investigates the accessibility of cookie notices on websites for users with visual
impairments (VI) via a set of system studies on top UK websites (n= 46) and a user study (n …

An empirical analysis of e-governments' cookie interfaces in 50 countries

JA Alharbi, AS Albesher, HA Wahsheh - Sustainability, 2023 - mdpi.com
Cookies have been used by websites to store information about user behavior. Although
they provide several benefits, including improving user experience, they can threaten user …

SoK: Technical implementation and human impact of internet privacy regulations

E Birrell, J Rodolitz, A Ding, J Lee… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Growing recognition of the potential for exploitation of personal data and of the shortcomings
of prior privacy regimes has led to the passage of a multitude of new privacy regulations …

Cloak: Hiding Retrieval Information in Blockchain Systems via Distributed Query Requests

J **ao, J Chang, L Lin, B Li, X Dai… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The privacy-preserving query is critical for modern blockchain systems, especially when
supporting many crucial applications such as finance and healthcare. Recent advances in …