Pharmacrypt: Blockchain for critical pharmaceutical industry to counterfeit drugs

N Saxena, I Thomas, P Gope, P Burnap, N Kumar - Computer, 2020 - ieeexplore.ieee.org
This research analyzes the impact of counterfeit drugs on the health-care supply chain
industry and evaluates the solutions currently in place to reduce the number of counterfeits …

Collective Information Security in {Large-Scale} Urban Protests: the Case of Hong Kong

MR Albrecht, J Blasco, RB Jensen… - 30th USENIX security …, 2021 - usenix.org
The Anti-Extradition Law Amendment Bill protests in Hong Kong present a rich context for
exploring information security practices among protesters due to their large-scale urban …

Advancing a consent-forward paradigm for digital mental health data

SR Pendse, L Stapleton, N Kumar… - Nature Mental …, 2024 - nature.com
The field of digital mental health is advancing at a rapid pace. Passively collected data from
user engagements with digital tools and services continue to contribute insights into mental …

'The internet is in the satellites!': A systematic review of 3–15-year-olds' conceptions about the internet

C Brom, A Yaghobova, A Drobna, M Urban - Education and Information …, 2023 - Springer
Children aged 3–15 frequently use internet-enabled technologies for leisure and
educational purposes, yet they have limited knowledge about how the internet works …

“… I have my dad, sister, brother, and mom's password”: unveiling users' mental models of security and privacy-preserving tools

P Dumaru, A Shrestha, R Paudel… - … & Computer Security, 2024 - emerald.com
Purpose The purpose of this study is to understand user perceptions and misconceptions
regarding security tools. Security and privacy-preserving tools (for brevity, the authors term …

Investigating influencer VPN ads on YouTube

O Akgul, R Roberts, M Namara, D Levin… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
One widespread, but frequently overlooked, source of security information is influencer
marketing ads on YouTube for security and privacy products such as VPNs. This paper …

" Did They {F*** ing} Consent to That?": Safer Digital Intimacy via Proactive Protection Against {Image-Based} Sexual Abuse

L Qin, V Hamilton, S Wang, Y Aydinalp… - 33rd USENIX Security …, 2024 - usenix.org
As many as 8 in 10 adults share intimate content such as nude or lewd images. Sharing
such content has significant benefits for relationship intimacy and body image, and can offer …

Improving non-experts' understanding of end-to-end encryption: An exploratory study

W Bai, M Pearson, PG Kelley… - 2020 IEEE european …, 2020 - ieeexplore.ieee.org
End-to-end encryption (E2EE) can effectively protect the privacy of online communication
and has been adopted by several popular messaging apps. However, prior research …

Enter the WhatsApper: Reinventing digital activism at the time of chat apps

S Milan, S Barbosa - First Monday, 2020 - firstmonday.org
This paper investigates how the appropriation of chat apps by social actors is redesigning
digital activism and political participation today. To this end, we look at the case of# Unidos …

Account verification on social media: user perceptions and paid enrollment

M **ao, M Wang, A Kulshrestha, J Mayer - 32nd USENIX Security …, 2023 - usenix.org
We investigate how users perceive social media account verification, how those perceptions
compare to platform practices, and what happens when a gap emerges. We use recent …