Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2022
Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 449, Pages 1–19https://doi.org/10.1145/3491102.3517602In this paper, we studied people’s smart home privacy-protective behaviors (SH-PPBs), to gain a better understanding of their privacy management do’s and don’ts in this context. We first surveyed 159 participants and elicited 33 unique SH-PPB practices, ...
- research-articleApril 2022
Impact and User Perception of Sandwich Attacks in the DeFi Ecosystem
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 591, Pages 1–15https://doi.org/10.1145/3491102.3517585Decentralized finance (DeFi) enables crypto-asset holders to conduct complex financial transactions, while maintaining control over their assets in the blockchain ecosystem. However, the transparency of blockchain networks and the open mechanism of DeFi ...
- research-articleApril 2022Honorable Mention
How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks
- Rock Stevens,
- Daniel Votipka,
- Josiah Dykstra,
- Fernando Tomlinson,
- Erin Quartararo,
- Colin Ahern,
- Michelle L. Mazurek
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 589, Pages 1–18https://doi.org/10.1145/3491102.3517559Incident response playbooks provide step-by-step guidelines to help security operations personnel quickly respond to specific threat scenarios. Although playbooks are common in the security industry, they have not been empirically evaluated for ...
- research-articleApril 2022
Barriers to Online Dementia Information and Mitigation
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 513, Pages 1–14https://doi.org/10.1145/3491102.3517554There is growing interest in HCI to study ways to support access to accurate, accessible, relevant online health information for different populations. Yet, there remains a need to understand the barriers that are posed by the way our platforms are ...
- research-articleApril 2022
”Your Eyes Tell You Have Used This Password Before”: Identifying Password Reuse from Gaze and Keystroke Dynamics
- Yasmeen Abdrabou,
- Johannes Schütte,
- Ahmed Shams,
- Ken Pfeuffer,
- Daniel Buschek,
- Mohamed Khamis,
- Florian Alt
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 400, Pages 1–16https://doi.org/10.1145/3491102.3517531A significant drawback of text passwords for end-user authentication is password reuse. We propose a novel approach to detect password reuse by leveraging gaze as well as typing behavior and study its accuracy. We collected gaze and typing behavior from ...
-
- research-articleApril 2022
Debiased-CAM to mitigate image perturbations with faithful visual explanations of machine learning
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 182, Pages 1–32https://doi.org/10.1145/3491102.3517522Model explanations such as saliency maps can improve user trust in AI by highlighting important features for a prediction. However, these become distorted and misleading when explaining predictions of images that are subject to systematic error (bias) ...
- research-articleApril 2022
Privacy Design Strategies for Home Energy Management Systems (HEMS)
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 405, Pages 1–15https://doi.org/10.1145/3491102.3517515Home energy management systems (HEMS) offer control and the ability to manage energy, generating and collecting energy consumption data at the most detailed level. However, data at this level poses various privacy concerns, including, for instance, ...
- research-articleApril 2022
Hey Alexa, Who Am I Talking to?: Analyzing Users’ Perception and Awareness Regarding Third-party Alexa Skills
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 447, Pages 1–15https://doi.org/10.1145/3491102.3517510The Amazon Alexa voice assistant provides convenience through automation and control of smart home appliances using voice commands. Amazon allows third-party applications known as skills to run on top of Alexa to further extend Alexa’s capability. ...
- research-articleApril 2022
Users’ Expectations About and Use of Smartphone Privacy and Security Settings
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 407, Pages 1–24https://doi.org/10.1145/3491102.3517504With the growing smartphone penetration rate, smartphone settings remain one of the main models for information privacy and security controls. Yet, their usability is largely understudied, especially with respect to the usability impact on ...
- research-articleApril 2022
Trauma-Informed Computing: Towards Safer Technology Experiences for All
- Janet X. Chen,
- Allison McDonald,
- Yixin Zou,
- Emily Tseng,
- Kevin A Roundy,
- Acar Tamersoy,
- Florian Schaub,
- Thomas Ristenpart,
- Nicola Dell
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 544, Pages 1–20https://doi.org/10.1145/3491102.3517475Trauma is the physical, emotional, or psychological harm caused by deeply distressing experiences. Research with communities that may experience high rates of trauma has shown that digital technologies can create or exacerbate traumatic experiences. Via ...
- research-articleApril 2022
“It would probably turn into a social faux-pas”: Users’ and Bystanders’ Preferences of Privacy Awareness Mechanisms in Smart Homes
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 404, Pages 1–13https://doi.org/10.1145/3491102.3502137The opaque data practices in smart home devices have raised significant privacy concerns for smart home users and bystanders. One way to learn about the data practices is through privacy-related notifications. However, how to deliver these notifications ...
- research-articleApril 2022
Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 448, Pages 1–21https://doi.org/10.1145/3491102.3502136Fitness tracking applications allow athletes to record and share their exercises online, including GPS routes of their activities. However, sharing mobility data potentially raises real-world privacy and safety risks. One strategy to mitigate that risk ...
- research-articleApril 2022
“I’m Surprised So Much Is Connected”
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 620, Pages 1–13https://doi.org/10.1145/3491102.3502125A person’s online security setup is tied to the security of their individual accounts. Some accounts are particularly critical as they provide access to other online services. For example, an email account can be used for external account recovery or to ...
- research-articleApril 2022
Exploring Bystanders’ Privacy Concerns with Smart Homes in Jordan
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 446, Pages 1–24https://doi.org/10.1145/3491102.3502097Smart homes continue to raise concerns about privacy and encroachment of businesses into intimate spaces. Prior research has focused on families and device owners in western contexts (Europe and North America), and has identified the importance of ...
- research-articleApril 2022
Privacy, Surveillance, and Power in the Gig Economy
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 619, Pages 1–15https://doi.org/10.1145/3491102.3502083This paper addresses calls for more research on privacy in the gig economy across a range of work platforms. To understand privacy risks, behaviors, and consequences from the perspective of workers, we analyzed workers’ posts about privacy and ...
- research-articleApril 2022Honorable Mention
Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 588, Pages 1–24https://doi.org/10.1145/3491102.3502012Apple announced the introduction of app privacy details to their App Store in December 2020, marking the first ever real-world, large-scale deployment of the privacy nutrition label concept, which had been introduced by researchers over a decade ...
- research-articleApril 2022
“Okay, whatever”: An Evaluation of Cookie Consent Interfaces
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 621, Pages 1–27https://doi.org/10.1145/3491102.3501985Many websites have added cookie consent interfaces to meet regulatory consent requirements. While prior work has demonstrated that they often use dark patterns — design techniques that lead users to less privacy-protective options — other usability ...
- research-articleApril 2022
Drawing Out the Everyday Hyper-[In]Securities of Digital Identity
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 254, Pages 1–18https://doi.org/10.1145/3491102.3501961In a study of everyday digital identity, a set of primary drawings were made by researchers in online focus group settings as a way to capture our participants’ spoken narratives of hyper-[in]security in the usages of digital identity. In a second stage ...
- research-articleApril 2022Honorable Mention
Recruiting Participants With Programming Skills: A Comparison of Four Crowdsourcing Platforms and a CS Student Mailing List
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 590, Pages 1–15https://doi.org/10.1145/3491102.3501957Reliably recruiting participants with programming skills is an ongoing challenge for empirical studies involving software development technologies, often leading to the use of crowdsourcing platforms and computer science (CS) students. In this work, we ...
- research-articleApril 2022Honorable Mention
Field Evidence of the Effects of Privacy, Data Transparency, and Pro-social Appeals on COVID-19 App Attractiveness
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 622, Pages 1–21https://doi.org/10.1145/3491102.3501869COVID-19 exposure-notification apps have struggled to gain adoption. Existing literature posits as potential causes of this low adoption: privacy concerns, insufficient data transparency, and the type of appeal – collective- vs. individual-good – used ...