The dilemma of user engagement in privacy notices: Effects of interaction modes and habituation on user attention

F Karegar, JS Pettersson… - ACM Transactions on …, 2020 - dl.acm.org
Privacy notices and consent forms are the means of conveying privacy policy information to
users. In Europe, a valid consent needs to be confirmed by a clear affirmative action. Despite …

[PDF][PDF] Eye-tracking in Association with Phishing Cyber Attacks: A Comprehensive Literature Review

N Hussein - learning, 2023 - researchgate.net
As of 2021, it has been reported that around 90% of data breaches occur on account of
phishing, while about 83% of organizations experienced phishing attacks [1]. Phishing can …

Helping john to make informed decisions on using social login

F Karegar, N Gerber, M Volkamer… - Proceedings of the 33rd …, 2018 - dl.acm.org
Users make two privacy-related decisions when signing up for a new Service Provider
(SP):(1) whether to use an existing Single Sign-On (SSO) account of an Identity Provider …

An evaluation of three designs to engage users when providing their consent on smartphones

D Lindegren, F Karegar, B Kane… - Behaviour & Information …, 2021 - Taylor & Francis
The graphical and interactive design of a consent form helps individuals to keep control and
pay attention to the information that they are disclosing. In the context of mobile apps we …

Exploring Pointer Assisted Reading (PAR): Using mouse movements to analyze web users' reading behaviors and patterns

I Kirsh, M Joy - International Conference on Human-Computer …, 2020 - Springer
Abstract This paper explores Pointer Assisted Reading (PAR), a reading behavior consisting
of moving the mouse cursor (also known as the pointer) along sentences to mark the …

Directions and speeds of mouse movements on a website and reading patterns: a web usage mining case study

I Kirsh - Proceedings of the 10th International Conference on …, 2020 - dl.acm.org
Mouse activity is known as an important indicator of user attention and interest on a web
page. Many modern commercial web analytics services record and report mouse activity of …

Applying eye tracking in information security

ZH Shokishalov, H Wang - Procedia Computer Science, 2019 - Elsevier
In this paper, we are considering the possibility of using eye tracking technology in the
context of information security. We expect that this novel technique will have a very effective …

Virtual finger-point reading behaviors: A case study of mouse cursor movements on a website

I Kirsh - Big Data Research, 2022 - Elsevier
Web analytics has changed significantly in recent years. As part of the big data revolution,
frequent low-level user actions, such as mouse movements and clicks, are often used in …

Towards Improving Transparency, Intervenability, and Consent in HCI

F Karegar - 2018 - diva-portal.org
Transparency of personal data processing is enforced by most Western privacy laws,
including the new General Data Protection Regulation (GDPR) which will be effective from …

Assessments of a cloud-based data wallet for personal identity management

F Karegar, D Lindegren, JS Pettersson… - … , Cyprus, September 6 …, 2017 - diva-portal.org
Within a project developing cloud technology for identity access management, usability tests
of mockups of a mobile app identity provider were conducted to assess users' …