Das et al., 2018 - Google Patents
Breaking! A typology of security and privacy news and how it's sharedDas et al., 2018
View PDF- Document ID
- 12175276896553059304
- Author
- Das S
- Lo J
- Dabbish L
- Hong J
- Publication year
- Publication venue
- Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems
External Links
Snippet
News coverage of security and privacy (S&P) events is pervasive and may affect the salience of S&P threats to the public. To better understand this coverage and its effects, we asked: What types of S&P news come into people's awareness? How do people hear about …
- 230000035945 sensitivity 0 abstract description 29
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Das et al. | Breaking! A typology of security and privacy news and how it's shared | |
CA3061638C (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
US10572684B2 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
Mayer et al. | " Now I'm a bit {angry:}" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them | |
Kang et al. | Privacy Attitudes of Mechanical Turk Workers and the {US}. Public | |
Moallem | Cybersecurity awareness among students and faculty | |
Khan et al. | Cyber-security and risky behaviors in a developing country context: A Pakistani perspective | |
Boyd et al. | Understanding the security and privacy advice given to black lives matter protesters | |
Herbert et al. | A world full of privacy and security (mis) conceptions? findings of a representative survey in 12 countries | |
CA3104119A1 (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
Tschantz et al. | Formal methods for privacy | |
Albulayhi et al. | A Comprehensive Study on Privacy and Security on Social Media. | |
Kuang et al. | Predicting age and gender from network telemetry: Implications for privacy and impact on policy | |
Wu et al. | Analysis of trending topics and text-based channels of information delivery in cybersecurity | |
Libert et al. | Preserving needles in the haystack: A search engine and multi-jurisdictional forensic documentation system for privacy violations on the web | |
Shelton | The role of corporate and government surveillance in shifting journalistic information security practices | |
Guntrum | Keyboard Fighters: The Use of ICTs by Activists in Times of Military Coup in Myanmar | |
Kulkarni et al. | Perception of privacy in a data driven world | |
Banisar | Linking ICTs, the right to privacy, freedom of expression and access to information | |
Lindner et al. | When the Public Seeks Anonymity Online: How News, Industry, and Socio-Political Conditions Shape Interest in the Tor Anonymity Network, 2006-2015 | |
SCHAEWITZ et al. | A World Full of Privacy and Security (Mis) conceptions? Findings of a Representative Survey in 12 Countries | |
Ansong | How Consumers Responded to The Cambridge Analytica Scandal | |
Walter et al. | InfoSec. pptx: A Longitudinal Study of Speakers, Topics, and Sponsors at Security Conferences in Academia and Industry | |
Zou | Understanding and Improving Consumers' Adoption of Online Privacy-Protective Behaviors | |
Almahameed et al. | Arab culture and privacy of social media: a theoretical study |