Pharmacrypt: Blockchain for critical pharmaceutical industry to counterfeit drugs
This research analyzes the impact of counterfeit drugs on the health-care supply chain
industry and evaluates the solutions currently in place to reduce the number of counterfeits …
industry and evaluates the solutions currently in place to reduce the number of counterfeits …
Collective Information Security in {Large-Scale} Urban Protests: the Case of Hong Kong
The Anti-Extradition Law Amendment Bill protests in Hong Kong present a rich context for
exploring information security practices among protesters due to their large-scale urban …
exploring information security practices among protesters due to their large-scale urban …
Advancing a consent-forward paradigm for digital mental health data
The field of digital mental health is advancing at a rapid pace. Passively collected data from
user engagements with digital tools and services continue to contribute insights into mental …
user engagements with digital tools and services continue to contribute insights into mental …
'The internet is in the satellites!': A systematic review of 3–15-year-olds' conceptions about the internet
Children aged 3–15 frequently use internet-enabled technologies for leisure and
educational purposes, yet they have limited knowledge about how the internet works …
educational purposes, yet they have limited knowledge about how the internet works …
“… I have my dad, sister, brother, and mom's password”: unveiling users' mental models of security and privacy-preserving tools
Purpose The purpose of this study is to understand user perceptions and misconceptions
regarding security tools. Security and privacy-preserving tools (for brevity, the authors term …
regarding security tools. Security and privacy-preserving tools (for brevity, the authors term …
Investigating influencer VPN ads on YouTube
One widespread, but frequently overlooked, source of security information is influencer
marketing ads on YouTube for security and privacy products such as VPNs. This paper …
marketing ads on YouTube for security and privacy products such as VPNs. This paper …
" Did They {F*** ing} Consent to That?": Safer Digital Intimacy via Proactive Protection Against {Image-Based} Sexual Abuse
As many as 8 in 10 adults share intimate content such as nude or lewd images. Sharing
such content has significant benefits for relationship intimacy and body image, and can offer …
such content has significant benefits for relationship intimacy and body image, and can offer …
Improving non-experts' understanding of end-to-end encryption: An exploratory study
End-to-end encryption (E2EE) can effectively protect the privacy of online communication
and has been adopted by several popular messaging apps. However, prior research …
and has been adopted by several popular messaging apps. However, prior research …
Enter the WhatsApper: Reinventing digital activism at the time of chat apps
S Milan, S Barbosa - First Monday, 2020 - firstmonday.org
This paper investigates how the appropriation of chat apps by social actors is redesigning
digital activism and political participation today. To this end, we look at the case of# Unidos …
digital activism and political participation today. To this end, we look at the case of# Unidos …
Account verification on social media: user perceptions and paid enrollment
We investigate how users perceive social media account verification, how those perceptions
compare to platform practices, and what happens when a gap emerges. We use recent …
compare to platform practices, and what happens when a gap emerges. We use recent …