Tang et al., 2022 - Google Patents
Replication: How well do my results generalize now? The external validity of online privacy and security surveysTang et al., 2022
View PDF- Document ID
- 12034433716407882664
- Author
- Tang J
- Birrell E
- Lerner A
- Publication year
- Publication venue
- Eighteenth symposium on usable privacy and security (SOUPS 2022)
External Links
Snippet
Privacy and security researchers often rely on data collected through online crowdsourcing platforms such as Amazon Mechanical Turk (MTurk) and Prolific. Prior work---which used data collected in the United States between 2013 and 2017---found that MTurk responses …
- 230000002062 proliferating 0 abstract description 144
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tang et al. | Replication: How well do my results generalize now? The external validity of online privacy and security surveys | |
Utz et al. | (Un) informed consent: Studying GDPR consent notices in the field | |
Sawaya et al. | Self-confidence trumps knowledge: A cross-cultural study of security behavior | |
Redmiles et al. | I think they're trying to tell me something: Advice sources and selection for digital security | |
Zou et al. | Examining the adoption and abandonment of security, privacy, and identity theft protection practices | |
Jakesch et al. | How different groups prioritize ethical values for responsible AI | |
Mathur et al. | Characterizing the Use of {Browser-Based} Blocking Extensions To Prevent Online Tracking | |
Rao et al. | Expecting the unexpected: Understanding mismatched privacy expectations online | |
Bermejo Fernandez et al. | This website uses nudging: Mturk workers' behaviour on cookie consent notices | |
Redmiles et al. | Examining the demand for spam: Who clicks? | |
Albayram et al. | A study on designing video tutorials for promoting security features: A case study in the context of two-factor authentication (2fa) | |
US9064021B2 (en) | Data source attribution system | |
Tahaei et al. | Recruiting participants with programming skills: A comparison of four crowdsourcing platforms and a CS student mailing list | |
Tang et al. | Defining privacy: How users interpret technical terms in privacy policies | |
Young et al. | Malware avoidance motivations and behaviors: A technology threat avoidance replication | |
Herbert et al. | A world full of privacy and security (mis) conceptions? Findings of a representative survey in 12 countries | |
Matsuura et al. | Careless participants are essential for our phishing study: Understanding the impact of screening methods | |
Abrokwa et al. | Comparing Security and Privacy Attitudes Among {US}. Users of Different Smartphone and {Smart-Speaker} Platforms | |
Wang et al. | Identifying and preventing fraudulent responses in online public health surveys: lessons learned during the COVID-19 pandemic | |
Wisniewski et al. | Predicting smartphone location-sharing decisions through self-reflection on past privacy behavior | |
Story | Design and Evaluation of Security and Privacy Nudges: From Protection Motivation Theory to Implementation Intentions. | |
Habib | Evaluating the Usability of Privacy Choice Mechanisms. | |
Smith et al. | A Study of GDPR Compliance under the Transparency and Consent Framework | |
Zou et al. | Encouraging users to change breached passwords using the protection motivation theory | |
Davis | Cybersecurity risk-responsibility taxonomy: The role of cybersecurity social responsibility in small enterprises on risk of data breach |