The experience sampling method on mobile devices

N Van Berkel, D Ferreira, V Kostakos - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The Experience Sampling Method (ESM) is used by scientists from various disciplines to
gather insights into the intra-psychic elements of human life. Researchers have used the …

A design space for effective privacy notices

F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …

A design space for privacy choices: Towards meaningful privacy control in the internet of things

Y Feng, Y Yao, N Sadeh - Proceedings of the 2021 CHI Conference on …, 2021 - dl.acm.org
“Notice and choice” is the predominant approach for data privacy protection today. There is
considerable user-centered research on providing effective privacy notices but not enough …

An experience sampling study of user reactions to browser warnings in the field

RW Reeder, AP Felt, S Consolvo, N Malkin… - Proceedings of the …, 2018 - dl.acm.org
Web browser warnings should help protect people from malware, phishing, and network
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …

More harm than good? How messages that interrupt can make us vulnerable

JL Jenkins, BB Anderson, A Vance… - Information Systems …, 2016 - pubsonline.informs.org
System-generated alerts are ubiquitous in personal computing and, with the proliferation of
mobile devices, daily activity. While these interruptions provide timely information, research …

How short is too short? Implications of length and framing on the effectiveness of privacy notices

J Gluck, F Schaub, A Friedman, H Habib… - Twelfth symposium on …, 2016 - usenix.org
Privacy policies are often too long and difficult to understand, and are therefore ignored by
users. Shorter privacy notices with clearer wording may increase users' privacy awareness …

Put your warning where your link is: Improving and evaluating email phishing warnings

J Petelka, Y Zou, F Schaub - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
Phishing emails often disguise a link's actual URL. Thus, common anti-phishing advice is to
check a link's URL before clicking, but email clients do not support this well. Automated …

Privacy in immersive extended reality: Exploring user perceptions, concerns, and co** strategies

H Hadan, DM Wang, LE Nacke… - Proceedings of the CHI …, 2024 - dl.acm.org
Extended Reality (XR) technology is changing online interactions, but its granular data
collection sensors may be more invasive to user privacy than web, mobile, and the Internet …

Interruptibility prediction for ubiquitous systems: conventions and new directions from a growing field

LD Turner, SM Allen, RM Whitaker - … of the 2015 ACM international joint …, 2015 - dl.acm.org
When should a machine attempt to communicate with a user? This is a historical problem
that has been studied since the rise of personal computing. More recently, the emergence of …

Automating contextual privacy policies: Design and evaluation of a production tool for digital consumer privacy awareness

M Windl, N Henze, A Schmidt, SS Feger - … of the 2022 CHI Conference on …, 2022 - dl.acm.org
Users avoid engaging with privacy policies because they are lengthy and complex, making it
challenging to retrieve relevant information. In response, research proposed contextual …