Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

A Look Into User's Privacy Perceptions And Data Practices Of Iot Devices, Mahdi Nasrullah Al-Ameen, Apoorva Chauhan, M.A. Manazir Ahsan, Huzeyfe Kocabas Aug 2021

A Look Into User's Privacy Perceptions And Data Practices Of Iot Devices, Mahdi Nasrullah Al-Ameen, Apoorva Chauhan, M.A. Manazir Ahsan, Huzeyfe Kocabas

Computer Science Student Research

Purpose: With the rapid deployment of Internet of Things (IoT) technologies, it has been essential to address the security and privacy issues through maintaining transparency in data practices. The prior research focused on identifying people’s privacy preferences in different contexts of IoT usage, and their mental models of security threats. However, there is a dearth in existing literature to understand the mismatch between user’s perceptions and the actual data practices of IoT devices. Such mismatches could lead users unknowingly sharing their private information, exposing themselves to unanticipated privacy risks. We aim to identify these mismatched privacy perceptions in our work. …


Understanding User Behavior, Information Exposure, And Privacy Risks In Managing Old Devices, Mahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, Huzeyfe Kocabas Jul 2021

Understanding User Behavior, Information Exposure, And Privacy Risks In Managing Old Devices, Mahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, Huzeyfe Kocabas

Computer Science Student Research

The goal of this study is to understand the behavior of users from developing countries in managing an old device (e.g., computer, mobile phone), which has been replaced by a new device, or suffers from technical issues providing a notion that it may stop working soon. The prior work explored the ecology and challenges of repairing old devices in developing regions. However, it is still understudied how the strategies of people from developing countries in managing their personal information on old devices could impact their digital privacy. To address this gap in existing literature, we conducted semi-structured interview with 52 …


Understanding User's Behavior And Protection Strategy Upon Losing, Or Identifying Unauthorized Access To Online Account, Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna, Mahdi Nasrullah Al-Ameen Jul 2021

Understanding User's Behavior And Protection Strategy Upon Losing, Or Identifying Unauthorized Access To Online Account, Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna, Mahdi Nasrullah Al-Ameen

Computer Science Student Research

A wide-range of personal and sensitive information are stored in users’ online accounts. Losing access, or an unauthorized access to one of those accounts could put them into the risks of privacy breach, cause financial loss, and compromise their accessibility to important information and documents. A large body of prior work focused on developing new schemes and strategies to protect users’ online security. However, there is a dearth in existing literature to understand users’ strategies and contingency plans to protect their online accounts once they lose access, or identify an unauthorized access to one of their accounts. We addressed this …