Mobile Privacy & Security
- Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck (USENIX Sec ’20)
- Disaster Privacy/Privacy Disaster (JASIST ’20)
- The Price is (Not) Right: Comparing Privacy in Free and Paid Apps (PETS ’20)
- 50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System (USENIX Sec ’19)
- On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies (ConPro ’19)
- Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps (ConPro ’19)
- “Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale (PETS ’18)
- Contextualizing Privacy Decisions for Better Prediction (and Protection) (CHI ’18)
- TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences (SOUPS ’17)
- The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences (Oakland ’17)
Web Privacy & Security
- Empirical Measurement of Systemic 2FA Usability (USENIX Sec ’20)
- “You’ve Got Your Nice List of Bugs, Now What?” Vulnerability Discovery and Management Processes in the Wild (SOUPS ’20)
- Nudge Me Right: Personalizing Online Security Nudges to People’s Decision-Making Styles (CHB ’20)
- Conducting Privacy-Sensitive Surveys: A Case Study of Civil Society Organizations (CHI Workshops ’20)
- A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions (CHI ’19)
- The Accuracy of the Demographic Inferences Shown on Google’s Ad Settings (WPES ’18)
- Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias (WEIS ’18)
- Quantifying Users’ Beliefs about Software Updates (USEC ’18)
- An Experience Sampling Study of User Reactions to Browser Warnings in the Field (CHI ’18)
- A Usability Evaluation of Tor Launcher (PETS ’17)
Wearable & Ubiquitous Computing
- Privacy Controls for Always-Listening Devices (NSPW ’19)
- Investigating Users’ Preferences and Expectations for Always-Listening Voice Assistants (IMWUT ’19)
- Privacy and Security Threat Models and Mitigation Strategies of Older Adults (SOUPS ’19)
- Privacy Attitudes of Smart Speaker Users (PETS ’19)
- Information Design in An Aged Care Context (PervasiveHealth ’19)
- “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S. (EuroUSEC ’18)
- Information Disclosure Concerns in The Age of Wearable Computing (USEC ’16)
- Somebody’s Watching Me? Assessing the Effectiveness of Webcam Indicator Lights (CHI ’15)
- Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms (CHI ’15)