Exploring motivations for online privacy protection behavior: Insights from panel data

SC Boerman, S Kruikemeier… - Communication …, 2021 - journals.sagepub.com
Personally managing and protecting online privacy has become an essential part of
everyday life. This research draws on the protection motivation theory (PMT) to investigate …

A comprehensive survey on mobile browser security issues, challenges and solutions

N Debnath, AK Jain - Information Security Journal: A Global …, 2024 - Taylor & Francis
Smartphone users use the mobile browser to interact with web-based applications.
However, mobile browsers are vulnerable to various types of attacks such as phishing …

Web browser privacy: What do browsers say when they phone home?

DJ Leith - IEEE Access, 2021 - ieeexplore.ieee.org
We measure the data sent to their back-end servers by five browsers: Google Chrome,
Mozilla Firefox, Apple Safari, Brave Browser and Microsoft Edge, during normal web …

Privacy and security comparison of web browsers: A review

R Madhusudhan, SV Surashe - International Conference on Advanced …, 2022 - Springer
In today's digital world, mobile phones, computers, laptops and other digital devices are the
most important things. The global pandemic like, Covid-19 has drastically changed the …

[HTML][HTML] Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study

X Fernández-Fuentes, TF Pena, JC Cabaleiro - Computers & Security, 2022 - Elsevier
The web browser has become one of the basic tools of everyday life. A tool that is
increasingly used to manage personal information. This has led to the introduction of new …

Defending novice user privacy: An evaluation of default web browser configurations

K Radivojevic, N Clark, A Klempay, P Brenner - Computers & Security, 2024 - Elsevier
Cyber novices often enter sensitive data into web browsers for routine activities such as
online shopping and bill payments, making them targets for malicious entities, including …

Web browser forensics in google chrome, mozilla firefox, and the tor browser bundle

R Nelson, A Shukla, C Smith - Digital Forensic Education: An Experiential …, 2020 - Springer
Browsers are widely used on personal computers, laptops and mobile devices. In this
chapter, we seek to determine and compare which forensic artifacts can be recovered from …

[HTML][HTML] Evolution of web tracking protection in Chrome

R Pan, A Ruiz-Martínez - Journal of Information Security and Applications, 2023 - Elsevier
In our society, protecting users' privacy is of utmost importance, especially when users
access websites. Increased awareness of privacy concerns has led web browsers to …

A forensic audit of the tor browser bundle

M Muir, P Leimich, WJ Buchanan - Digital Investigation, 2019 - Elsevier
The increasing use of encrypted data within file storage and in network communications
leaves investigators with many challenges. One of the most challenging is the Tor protocol …

A game theoretical model for anticipating email spear-phishing strategies

F Tchakounte, VS Nyassi, DEH Danga… - EAI Endorsed …, 2021 - publications.eai.eu
A solution to help victims against phishing is anticipating and leveraging impacts related to
phisher actions. In this regard, this work reshapes game theoretical logic between Intrusion …