Revisiting reflection in hci: Four design resources for technologies that support reflection

M Bentvelzen, PW Woźniak, PSF Herbes… - Proceedings of the …, 2022 - dl.acm.org
Reflection is a commonly addressed design goal in commercial systems and in Human-
Computer Interaction (HCI) research. Yet, it is still unclear what tools are at the disposal of …

Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

Friend or foe? Fake profile identification in online social networks

M Fire, D Kagan, A Elyashar, Y Elovici - Social Network Analysis and …, 2014 - Springer
The amount of personal information involuntarily exposed by users on online social
networks is staggering, as shown in recent research. Moreover, recent reports indicate that …

A new access control scheme for Facebook-style social networks

J Pang, Y Zhang - Computers & Security, 2015 - Elsevier
The popularity of online social networks (OSNs) makes the protection of users' private
information an important but scientifically challenging problem. In the literature, relationship …

Using community structure to control information sharing in online social networks

A Ranjbar, M Maheswaran - Computer Communications, 2014 - Elsevier
The dominant role of social networking in the web is turning human relations into conduits of
information flow. This means that the way information spreads on the web is determined to a …

Is visualization enough? evaluating the efficacy of mud-visualizer in enabling ease of deployment for manufacturer usage description (mud)

V Andalibi, J Dev, DI Kim, E Lear, LJ Camp - Proceedings of the 37th …, 2021 - dl.acm.org
The IETF Manufacturer Usage Description (MUD) standard was designed to protect IoT
devices through network micro-segmentation. In practice, this is implemented using per …

Six usable privacy heuristics

A de Lima Salgado, PCK Hung… - Anais do XXII Simpósio …, 2023 - sol.sbc.org.br
Enhancing privacy policy interfaces is crucial for improving users' trust in technology and
ensuring compliance with legislation. This thesis focused on developing usable interfaces …

Интеллектуальные сервисы защиты информации в критических инфраструктурах

ИВ Котенко, ИБ Саенко, ЕВ Дойникова, ЕС Новикова… - 2019 - elibrary.ru
В монографии рассмотрены ключевые вопросы, связанные с построением и
функционированием интеллектуальных сервисов защиты информации в критических …

Towards understanding location privacy awareness on geo-social networks

F Alrayes, AI Abdelmoty - ISPRS International Journal of Geo-Information, 2017 - mdpi.com
Users' awareness of the extent of information implicit in their geo-profiles on social networks
is limited. This questions the validity of their consent to the collection, storage and use of …

Towards location privacy awareness on geo-social networks

F Alrayes, A Abdelmoty - 2016 10th International Conference on …, 2016 - ieeexplore.ieee.org
With the current trend of embedding location services within social networks, an ever
growing amount of users' spatiotemporal tracks are being collected and used to generate …