Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
"I'm not convinced that they don't collect more than is necessary": user-controlled data minimization design in search engines
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 157, Pages 2797–2812Data minimization is a legal and privacy-by-design principle mandating that online services collect only data that is necessary for pre-specified purposes. While the principle has thus far mostly been interpreted from a system-centered perspective, there ...
- Work in ProgressMay 2024
Cross-Country Examination of People’s Experience with Targeted Advertising on Social Media
CHI EA '24: Extended Abstracts of the CHI Conference on Human Factors in Computing SystemsArticle No.: 91, Pages 1–10https://doi.org/10.1145/3613905.3650780Social media effectively connects businesses with diverse audiences. However, research related to targeted advertising and social media is rarely done beyond Western contexts. Through an online survey with 412 participants in the United States and three ...
Designing Accessible Obfuscation Support for Blind Individuals’ Visual Privacy Management
- Lotus Zhang,
- Abigale Stangl,
- Tanusree Sharma,
- Yu-Yun Tseng,
- Inan Xu,
- Danna Gurari,
- Yang Wang,
- Leah Findlater
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 235, Pages 1–19https://doi.org/10.1145/3613904.3642713Blind individuals commonly share photos in everyday life. Despite substantial interest from the blind community in being able to independently obfuscate private information in photos, existing tools are designed without their inputs. In this study, we ...
- research-articleMay 2024Honorable Mention
"Don't put all your eggs in one basket": How Cryptocurrency Users Choose and Secure Their Wallets
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 353, Pages 1–17https://doi.org/10.1145/3613904.3642534Cryptocurrency wallets come in various forms, each with unique usability and security features. Through interviews with 24 users, we explore reasons for selecting wallets in different contexts. Participants opt for smart contract wallets to simplify key ...
- research-articleMay 2024Honorable Mention
“I Can’t Believe It’s Not Custodial!”: Usable Trustless Decentralized Key Management
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 581, Pages 1–16https://doi.org/10.1145/3613904.3642464Key management has long remained a difficult unsolved problem in the field of usable security. While password-based key derivation functions (PBKDFs) are widely used to solve this problem in centralized applications, their low entropy and lack of a ...
-
- research-articleMay 2024
Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 974, Pages 1–22https://doi.org/10.1145/3613904.3642291The advent of Web3 technologies promises unprecedented levels of user control and autonomy. However, this decentralization shifts the burden of security onto the users, making it crucial to understand their security behaviors and perceptions. To address ...
- research-articleSeptember 2023
A First Look into Software Security Practices in Bangladesh
ACM Journal on Computing and Sustainable Societies (ACMJCSS), Volume 1, Issue 1Article No.: 8, Pages 1–24https://doi.org/10.1145/3616383Software security practices are critical in minimizing vulnerabilities and protecting unauthorized access to the code and the system. However, software security practices outside Western countries need to be better understood. This need for understanding ...
- research-articleAugust 2023
A mixed-methods study of security practices of smart contract developers
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 143, Pages 2545–2562Smart contracts are self-executing programs that run on blockchains (e.g., Ethereum). While security is a key concern for smart contracts, it is unclear how smart contract developers approach security. To help fill this research gap, we conducted a mixed-...
- research-articleAugust 2023
Iterative design of an accessible crypto wallet for blind users
SOUPS '23: Proceedings of the Nineteenth USENIX Conference on Usable Privacy and SecurityArticle No.: 21, Pages 381–398Crypto wallets are a key touch-point for cryptocurrency use. People use crypto wallets to make transactions, manage crypto assets, and interact with decentralized apps (dApps). However, as is often the case with emergent technologies, little attention has ...
- research-articleAugust 2023
GuardLens: supporting safer online browsing for people with visual impairments
- Smirity Kaushik,
- Natã M. Barbosa,
- Yaman Yu,
- Tanusree Sharma,
- Zachary Kilhoffer,
- JooYoung Seo,
- Sauvik Das,
- Yang Wang
SOUPS '23: Proceedings of the Nineteenth USENIX Conference on Usable Privacy and SecurityArticle No.: 20, Pages 361–380Visual cues play a key role in how users assess the privacy/ security of a website, but often remain inaccessible to people with visual impairments (PVIs), disproportionately exposing them to privacy and security risks. We employed an iterative, user-...
- extended-abstractJuly 2023
Using ChatGPT in HCI Research—A Trioethnography
CUI '23: Proceedings of the 5th International Conference on Conversational User InterfacesArticle No.: 8, Pages 1–6https://doi.org/10.1145/3571884.3603755This paper explores the lived experience of using ChatGPT in HCI research through a month-long trioethnography. Our approach combines the expertise of three HCI researchers with diverse research interests to reflect on our daily experience of living and ...
- research-articleApril 2023
User Perceptions and Experiences of Targeted Ads on Social Media Platforms: Learning from Bangladesh and India
CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing SystemsArticle No.: 663, Pages 1–15https://doi.org/10.1145/3544548.3581498While people’s perceptions of targeted ads have been studied extensively from a Western perspective (e.g., North America, Europe), we know little about users’ perceptions in the South Asian region. We interviewed 40 participants from two South Asian ...
- research-articleApril 2023
Disability-First Design and Creation of A Dataset Showing Private Visual Information Collected With People Who Are Blind
- Tanusree Sharma,
- Abigale Stangl,
- Lotus Zhang,
- Yu-Yun Tseng,
- Inan Xu,
- Leah Findlater,
- Danna Gurari,
- Yang Wang
CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing SystemsArticle No.: 51, Pages 1–15https://doi.org/10.1145/3544548.3580922We present the design and creation of a disability-first dataset, “BIV-Priv,” which contains 728 images and 728 videos of 14 private categories captured by 26 blind participants to support downstream development of artificial intelligence (AI) models. ...
- research-articleSeptember 2021
Privacy during Pandemic: A Global View of Privacy Practices around COVID-19 Apps
COMPASS '21: Proceedings of the 4th ACM SIGCAS Conference on Computing and Sustainable SocietiesPages 215–229https://doi.org/10.1145/3460112.3471958A large number of mobile phone applications have been built and deployed to combat COVID-19, offering various services to users, including virus information, contact tracing, and symptom monitoring among others. At the same time, the privacy and ...
- research-articleJanuary 2021
Enabling User-centered Privacy Controls for Mobile Applications: COVID-19 Perspective
ACM Transactions on Internet Technology (TOIT), Volume 21, Issue 1Article No.: 26, Pages 1–24https://doi.org/10.1145/3434777Mobile apps have transformed many aspects of clinical practice and are becoming a commonplace in healthcare settings. The recent COVID-19 pandemic has provided the opportunity for such apps to play an important role in reducing the spread of the virus. ...
- ArticleOctober 2020
Towards Inclusive Privacy Protections in the Cloud
Applied Cryptography and Network Security WorkshopsPages 337–359https://doi.org/10.1007/978-3-030-61638-0_19AbstractThe adoption of cloud computing has created tremendous prospects and cost savings for a variety of organizations. Although increasing resources and effort have been devoted to fighting cyber-threats in cloud environments, cloud computing continues ...
- extended-abstractFebruary 2021
Advocating for Users’ Privacy Protections: A Case study of COVID-19 apps
MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and ServicesArticle No.: 22, Pages 1–4https://doi.org/10.1145/3406324.3410711Mobile apps are being utilized in different regions around the world for contract tracing during this COVID-19 pandemic and many of these apps require personal information to be shared. The COVID-19 crisis has demonstrated how critical it is that we ...
- ArticleSeptember 2020
Improving Alcoholism Diagnosis: Comparing Instance-Based Classifiers Against Neural Networks for Classifying EEG Signal
AbstractAlcoholism involves psychological and biological components where multiple risk factors come into play. Assessment of the psychiatric emergency is a challenging issue for clinicians working with alcohol-dependent patients. Identifying alcoholics ...
- ArticleJuly 2020
Privacy Apps for Smartphones: An Assessment of Users’ Preferences and Limitations
AbstractSmartphones are becoming our most trusted computing devices for storing and dealing with highly sensitive information which makes smartphones an essential platform to take under control utilizing privacy-preserving applications (apps). There ...
- ArticleJune 2018
A RESTful E-Governance Application Framework for People Identity Verification in Cloud
AbstractAn effective application framework design for e-governance is definitely a challenging task. The majority of the prior research has focused on designing e-governance architecture where people identity verification takes long time using manual ...