Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems 2020
DOI: 10.1145/3313831.3376570
|View full text |Cite
|
Sign up to set email alerts
|

Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
31
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 46 publications
(33 citation statements)
references
References 54 publications
2
31
0
Order By: Relevance
“…One of our contributions is an estimate of people's adoption of a series of privacy-enhancing tools. Zou et al surveyed crowdworkers about their adoption and abandonment of 30 security and privacy practices [100]. The authors found that the most common reasons for abandoning a practice were perceptions that the practice was no longer needed, that associated risks had decreased, or that the practice was inconvenient.…”
Section: Adoption Of Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…One of our contributions is an estimate of people's adoption of a series of privacy-enhancing tools. Zou et al surveyed crowdworkers about their adoption and abandonment of 30 security and privacy practices [100]. The authors found that the most common reasons for abandoning a practice were perceptions that the practice was no longer needed, that associated risks had decreased, or that the practice was inconvenient.…”
Section: Adoption Of Toolsmentioning
confidence: 99%
“…A majority of Americans are concerned about their privacy [5]. Yet, despite expressed interest in privacyenhancing solutions, adoption of tools that offer privacy protection remains low [100]. A variety of tools are available, but it is unclear how much end users know about them.…”
Section: Introductionmentioning
confidence: 99%
“…Studies have shown that some users encounter difficulty and usability issues managing tracking related to targeted ads [2,6,35,43] and social media [22,57]. Many other studies have investigated mental models and preferences toward tracking management and online tracking in general [10,39,81]. Some have focused on narrow and specific contextual threats, such as browser history [50], opt-out and data deletion on websites [8,35,36], privacy expectations on the Internet of Things [53,79], and in mobile app contexts [44,45].…”
Section: User Modelingmentioning
confidence: 99%
“…As in prior studies [1,81], our participants suffered from misconceptions about the efficacy of various protections against PIPs, as well as difficulty identifying their presence or absence. Particularly, our qualitative data shows that users are likely to be misled by the signals they observe, placing greater importance on these signals than other more objective signals.…”
Section: Perspectives On Notices and Controlsmentioning
confidence: 99%
See 1 more Smart Citation