Tang et al., 2022 - Google Patents

Replication: How well do my results generalize now? The external validity of online privacy and security surveys

Tang et al., 2022

View PDF
Document ID
12034433716407882664
Author
Tang J
Birrell E
Lerner A
Publication year
Publication venue
Eighteenth symposium on usable privacy and security (SOUPS 2022)

External Links

Snippet

Privacy and security researchers often rely on data collected through online crowdsourcing platforms such as Amazon Mechanical Turk (MTurk) and Prolific. Prior work---which used data collected in the United States between 2013 and 2017---found that MTurk responses …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Tang et al. Replication: How well do my results generalize now? The external validity of online privacy and security surveys
Utz et al. (Un) informed consent: Studying GDPR consent notices in the field
Sawaya et al. Self-confidence trumps knowledge: A cross-cultural study of security behavior
Redmiles et al. I think they're trying to tell me something: Advice sources and selection for digital security
Zou et al. Examining the adoption and abandonment of security, privacy, and identity theft protection practices
Jakesch et al. How different groups prioritize ethical values for responsible AI
Mathur et al. Characterizing the Use of {Browser-Based} Blocking Extensions To Prevent Online Tracking
Rao et al. Expecting the unexpected: Understanding mismatched privacy expectations online
Bermejo Fernandez et al. This website uses nudging: Mturk workers' behaviour on cookie consent notices
Redmiles et al. Examining the demand for spam: Who clicks?
Albayram et al. A study on designing video tutorials for promoting security features: A case study in the context of two-factor authentication (2fa)
US9064021B2 (en) Data source attribution system
Tahaei et al. Recruiting participants with programming skills: A comparison of four crowdsourcing platforms and a CS student mailing list
Tang et al. Defining privacy: How users interpret technical terms in privacy policies
Young et al. Malware avoidance motivations and behaviors: A technology threat avoidance replication
Herbert et al. A world full of privacy and security (mis) conceptions? Findings of a representative survey in 12 countries
Matsuura et al. Careless participants are essential for our phishing study: Understanding the impact of screening methods
Abrokwa et al. Comparing Security and Privacy Attitudes Among {US}. Users of Different Smartphone and {Smart-Speaker} Platforms
Wang et al. Identifying and preventing fraudulent responses in online public health surveys: lessons learned during the COVID-19 pandemic
Wisniewski et al. Predicting smartphone location-sharing decisions through self-reflection on past privacy behavior
Story Design and Evaluation of Security and Privacy Nudges: From Protection Motivation Theory to Implementation Intentions.
Habib Evaluating the Usability of Privacy Choice Mechanisms.
Smith et al. A Study of GDPR Compliance under the Transparency and Consent Framework
Zou et al. Encouraging users to change breached passwords using the protection motivation theory
Davis Cybersecurity risk-responsibility taxonomy: The role of cybersecurity social responsibility in small enterprises on risk of data breach