Trauma-informed computing: Towards safer technology experiences for all

JX Chen, A McDonald, Y Zou, E Tseng… - Proceedings of the …, 2022 - dl.acm.org
Trauma is the physical, emotional, or psychological harm caused by deeply distressing
experiences. Research with communities that may experience high rates of trauma has …

Redress for dark patterns privacy harms? A case study on consent interactions

J Gunawan, C Santos, I Kamara - … of the 2022 symposium on computer …, 2022 - dl.acm.org
Internet users are constantly subjected to incessant demands for attention in a noisy digital
world. Countless inputs compete for the chance to be clicked, to be seen, and to be …

Privacy policies over time: Curation and analysis of a million-document dataset

R Amos, G Acar, E Lucherini, M Kshirsagar… - Proceedings of the Web …, 2021 - dl.acm.org
Automated analysis of privacy policies has proved a fruitful research direction, with
developments such as automated policy summarization, question answering systems, and …

A design space for privacy choices: Towards meaningful privacy control in the internet of things

Y Feng, Y Yao, N Sadeh - Proceedings of the 2021 CHI Conference on …, 2021 - dl.acm.org
“Notice and choice” is the predominant approach for data privacy protection today. There is
considerable user-centered research on providing effective privacy notices but not enough …

A comparative study of dark patterns across web and mobile modalities

J Gunawan, A Pradeep, D Choffnes… - Proceedings of the …, 2021 - dl.acm.org
Dark patterns are user interface elements that can influence a person's behavior against
their intentions or best interests. Prior work identified these patterns in websites and mobile …

Investigating deceptive design in GDPR's legitimate interest

L Kyi, S Ammanaghatta Shivakumar… - Proceedings of the …, 2023 - dl.acm.org
Legitimate interest is one of the six grounds for processing data under the European Union's
General Data Protection Regulation (GDPR). The flexibility and ambiguity of the term" …

Toggles, dollar signs, and triangles: How to (in) effectively convey privacy choices with icons and link texts

H Habib, Y Zou, Y Yao, A Acquisti, L Cranor… - Proceedings of the …, 2021 - dl.acm.org
Increasingly, icons are being proposed to concisely convey privacy-related information and
choices to users. However, complex privacy concepts can be difficult to communicate. We …

How usable are ios app privacy labels?

S Zhang, Y Feng, Y Yao, LF Cranor… - Proceedings on Privacy …, 2022 - petsymposium.org
Standardized privacy labels that succinctly summarize those data practices that people are
most commonly concerned about offer the promise of providing users with more effective …

Finding a choice in a haystack: Automatic extraction of opt-out statements from privacy policy text

V Bannihatti Kumar, R Iyengar, N Nisal… - Proceedings of The …, 2020 - dl.acm.org
Website privacy policies sometimes provide users the option to opt-out of certain collections
and uses of their personal data. Unfortunately, many privacy policies bury these instructions …

Understanding account deletion and relevant dark patterns on social media

B Schaffner, NA Lingareddy, M Chetty - … of the ACM on Human-Computer …, 2022 - dl.acm.org
Social media users may wish to delete their accounts, but it is unclear if this process is easy
to complete or if users understand what happens to their account data after deletion …