The experience sampling method on mobile devices
The Experience Sampling Method (ESM) is used by scientists from various disciplines to
gather insights into the intra-psychic elements of human life. Researchers have used the …
gather insights into the intra-psychic elements of human life. Researchers have used the …
A design space for effective privacy notices
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
A design space for privacy choices: Towards meaningful privacy control in the internet of things
“Notice and choice” is the predominant approach for data privacy protection today. There is
considerable user-centered research on providing effective privacy notices but not enough …
considerable user-centered research on providing effective privacy notices but not enough …
An experience sampling study of user reactions to browser warnings in the field
Web browser warnings should help protect people from malware, phishing, and network
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …
More harm than good? How messages that interrupt can make us vulnerable
System-generated alerts are ubiquitous in personal computing and, with the proliferation of
mobile devices, daily activity. While these interruptions provide timely information, research …
mobile devices, daily activity. While these interruptions provide timely information, research …
How short is too short? Implications of length and framing on the effectiveness of privacy notices
Privacy policies are often too long and difficult to understand, and are therefore ignored by
users. Shorter privacy notices with clearer wording may increase users' privacy awareness …
users. Shorter privacy notices with clearer wording may increase users' privacy awareness …
Put your warning where your link is: Improving and evaluating email phishing warnings
Phishing emails often disguise a link's actual URL. Thus, common anti-phishing advice is to
check a link's URL before clicking, but email clients do not support this well. Automated …
check a link's URL before clicking, but email clients do not support this well. Automated …
Privacy in immersive extended reality: Exploring user perceptions, concerns, and co** strategies
Extended Reality (XR) technology is changing online interactions, but its granular data
collection sensors may be more invasive to user privacy than web, mobile, and the Internet …
collection sensors may be more invasive to user privacy than web, mobile, and the Internet …
Interruptibility prediction for ubiquitous systems: conventions and new directions from a growing field
When should a machine attempt to communicate with a user? This is a historical problem
that has been studied since the rise of personal computing. More recently, the emergence of …
that has been studied since the rise of personal computing. More recently, the emergence of …
Automating contextual privacy policies: Design and evaluation of a production tool for digital consumer privacy awareness
Users avoid engaging with privacy policies because they are lengthy and complex, making it
challenging to retrieve relevant information. In response, research proposed contextual …
challenging to retrieve relevant information. In response, research proposed contextual …