scholarly journals Awareness, Adoption, and Misconceptions of Web Privacy Tools

2021 ◽  
Vol 2021 (3) ◽  
pp. 308-333
Author(s):  
Peter Story ◽  
Daniel Smullen ◽  
Yaxing Yao ◽  
Alessandro Acquisti ◽  
Lorrie Faith Cranor ◽  
...  

Abstract Privacy and security tools can help users protect themselves online. Unfortunately, people are often unaware of such tools, and have potentially harmful misconceptions about the protections provided by the tools they know about. Effectively encouraging the adoption of privacy tools requires insights into people’s tool awareness and understanding. Towards that end, we conducted a demographically-stratified survey of 500 US participants to measure their use of and perceptions about five web browsing-related tools: private browsing, VPNs, Tor Browser, ad blockers, and antivirus software. We asked about participants’ perceptions of the protections provided by these tools across twelve realistic scenarios. Our thematic analysis of participants’ responses revealed diverse forms of misconceptions. Some types of misconceptions were common across tools and scenarios, while others were associated with particular combinations of tools and scenarios. For example, some participants suggested that the privacy protections offered by private browsing, VPNs, and Tor Browser would also protect them from security threats – a misconception that might expose them to preventable risks. We anticipate that our findings will help researchers, tool designers, and privacy advocates educate the public about privacy- and security-enhancing technologies.

2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Ijaz Ahmad Awan ◽  
Muhammad Shiraz ◽  
Muhammad Usman Hashmi ◽  
Qaisar Shaheen ◽  
Rizwan Akhtar ◽  
...  

The tremendous growth of computational clouds has attracted and enabled intensive computation on resource-constrained client devices. Predominantly, smart mobiles are enabled to deploy data and computational intensive applications by leveraging on the demand service model of remote data centres. However, outsourcing personal and confidential data to the remote data servers is challenging for the reason of new issues involved in data privacy and security. Therefore, the traditional advanced encryption standard (AES) algorithm needs to be enhanced in order to cope with the emerging security threats in the cloud environment. This research presents a framework with key features including enhanced security and owner’s data privacy. It modifies the 128 AES algorithm to increase the speed of the encryption process, 1000 blocks per second, by the double round key feature. However, traditionally, there is a single round key with 800 blocks per second. The proposed algorithm involves less power consumption, better load balancing, and enhanced trust and resource management on the network. The proposed framework includes deployment of AES with 16, 32, 64, and 128 plain text bytes. Simulation results are visualized in a way that depicts suitability of the algorithm while achieving particular quality attributes. Results show that the proposed framework minimizes energy consumption by 14.43%, network usage by 11.53%, and delay by 15.67%. Hence, the proposed framework enhances security, minimizes resource utilization, and reduces delay while deploying services of computational clouds.


2021 ◽  
Vol 5 (2) ◽  
Author(s):  
M’Balia Thomas

In the wake of ‘Black Lives Matter’, this paper examines the concept of testimonial injustice and the prejudicial stances held towards victims that diminishes the credibility of their claims and the social support they receive from the public. To explore this concept, the following work revisits the widely parodied U.S. originating broadcast news report, The Bed Intruder. In the broadcast, victims of a home invasion and attempted rape deliver a public call that outlines the conditions of their victimhood and the potential threat to the community. A rhetorical stylistic analysis of the victims’ testimonial discourse and a thematic analysis of a sample of YouTube videos that reappropriate and parody their discourse are conducted. The analyses highlight the memetic elements of the video parodies that acknowledge the victimisation and yet strategically misconstrue events in ways that 1) render the victims and their claims less credible and 2) fail to provide them with the moral concern such an acknowledgement deserves.


2021 ◽  
Author(s):  
Paul M. Garrett ◽  
Yuwen Wang ◽  
Joshua P. White ◽  
Yoshihisa Kashima ◽  
Simon Dennis ◽  
...  

BACKGROUND Governments worldwide have introduced COVID-19 tracing technologies. Taiwan, a world leader in controlling the virus’ spread, has introduced the Taiwan ‘Social Distancing App’ to facilitate COVID-19 contact tracing. However, for these technologies to be effective, they must be accepted and used by the public. OBJECTIVE Our study aimed to determine public acceptance for three hypothetical tracing technologies: a centralized Government App, a decentralized Bluetooth App (e.g., Taiwan’s Social Distancing App), and a Telecommunication tracing technology; and model what factors contributed to their acceptance. METHODS Four nationally representative surveys were conducted in April 2020 sampling 6,000 Taiwanese residents. Perceptions and impacts of COVID-19, government effectiveness, worldviews, and attitudes towards and acceptance of one-of-three hypothetical tracing technologies were assessed. RESULTS Technology acceptance was high across all hypothetical technologies (67% - 73%) and improved with additional privacy measures (82% - 88%). Bayesian modelling (using 95% highest density credible intervals) showed data sensitivity and perceived poor COVID-19 policy compliance inhibited technology acceptance. By contrast, technology benefits (e.g., returning to activities, reducing virus spread, lowering the likelihood of infection), higher education, and perceived technology privacy, security, and trust, were all contributing factors to overall acceptance. Bayesian ordinal probit models revealed higher COVID-19 concern for other people than for one’s self. CONCLUSIONS Taiwan is currently using a range of technologies to minimize the spread of COVID-19 as the country returns to normal economic and social activities. We observed high acceptance for COVID-19 tracing technologies among the Taiwanese public, a promising and necessary finding for the successful introduction of Taiwan’s new ‘Social Distancing App’. Policy makers may capitalize on this acceptance by focusing attention towards the App’s benefits, privacy and security measures, making the App’s privacy measures transparent to the public, and emphasizing App uptake and compliance among the public. CLINICALTRIAL Not applicable.


2019 ◽  
Vol 26 (3) ◽  
pp. 416-431
Author(s):  
Myriam Martí-Sánchez ◽  
Desamparados Cervantes-Zacarés ◽  
Arturo Ortigosa-Blanch

Purpose The purpose of this paper is to analyse how the media addresses entrepreneurship and to identify the attributes linked to this phenomenon. Design/methodology/approach The sample is defined in terms of a linguistic corpus comprised of content related to entrepreneurship drawn from the digital editions of the three most important Spanish economic newspapers for the period 2010–2017. Word association and co-occurrence analyses were carried out. Further, a non-supervised clustering process was used as the basis for a thematic analysis. Findings Correspondence between social and media patterns related to the entrepreneurship phenomenon is revealed by the results. It is shown how attributes such as “success”, “innovation”, “ecosystem” and “woman” appear as very relevant and are linked to different co-occurrence scenarios. Relevant thematic groups are also identified related to lexical associations such as innovation, digital economy and public policies linked to entrepreneurship. Research limitations/implications It is important to emphasise that this study has identified and explored relationships between words, but not their evolution. Furthermore, conclusions cannot be drawn concerning whether there are differences in how each newspaper has dealt with entrepreneurship because of the way the corpus was constructed. Originality/value The study provides empirical evidence that helps to identify the way media approaches entrepreneurship. The authors carried out the analysis on the media contents and not on the perception of the public on the phenomenon.


2020 ◽  
Vol 3 (2) ◽  
pp. 5
Author(s):  

On June 2nd, 2020, the Canadian Association for Security and Intelligence Studies (CASIS) Vancouver hosted its second digital roundtable event of the year titled, “Privacy and Security: Working Hand in Hand to Protect You Online.” This presentation featured Dr. Patrick Neal who has been involved in the public safety field since 1982. Dr. Neal’s presentation focused on the cohesiveness of privacy and security in the near future, privacy constructs, myths and harms of privacy, and privacy enhancing technologies. The subsequent roundtable discussion centered around Dr. Neal’s lecture in a question and answer period. APA Citation CASIS Vancouver. (2020). Privacy and security: working hand in hand to protect you online. The Journal of Intelligence, Conflict, and Warfare, 3(2), 61-65. https://journals.lib.sfu.ca/index.php/jicw/article/view/2407/1818.


2020 ◽  
Vol 25 (13) ◽  
Author(s):  
Anna-Leena Lohiniva ◽  
Jussi Sane ◽  
Katja Sibenberg ◽  
Taneli Puumalainen ◽  
Mika Salminen

Understanding risk perceptions of the public is critical for risk communication. In February 2020, the Finnish Institute for Health and Welfare started collecting weekly qualitative data on coronavirus disease (COVID-19) risk perception that informs risk communication efforts. The process is based on thematic analysis of emails and social media messages from the public and identifies factors linked to appraisal of risk magnitude, which are developed into risk communication recommendations together with health and communication experts.


2016 ◽  
Vol 8 (3) ◽  
Author(s):  
Neal D Goldstein ◽  
Anand D Sarwate

Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.


2019 ◽  
Author(s):  
Erik Peterson ◽  
Ali Kagalwala

Partisans hold unfavorable views of media they associate with the other party. They also avoid out-party news sources. We link these developments and argue that, absent direct experience, partisans assess out-party media based off negative and inaccurate stereotypes. This means cross-cutting exposure that challenges these misperceptions can improve assessments of out-party media. To support this argument, we use survey-linked web browsing data to show the public has hostile views of out-party news sources they rarely encounter. We conduct three survey experiments that demonstrate cross-cutting exposure to non-political or neutral political coverage – forms of news widely available from partisan sources online – reduces oppositional media hostility. These findings explain how perceptions of rampant bias from out-party media coexist with modest differences in the online content major partisan news outlets provide. More broadly, we illustrate how negative misperceptions can sustain animus towards an out-group when individuals avoid direct encounters with them.


Author(s):  
Payod Soni

Abysmal state of policies governing the health plan providers lead to a huge discontent amongst the public in regards to their health plan besides privacy and security of their medical records. Anyone with access to the patient's medical records could potentially share it with parties like health plan providers or the employers. To address the privacy and the security of patient's medical records, Congress enacted HIPAA in 1996. Chapter starts with discussing the need for HIPAA. Subsequently, we discuss HIPAA at considerable depth. Significant additions and changes were made in subsequent acts and amendments due to pressing policy needs and to address various loopholes. The chapter provides a chronological recount of HIPAA since its introduction. Once the reader develops a complete understanding of HIPAA regulation, we shift our focus to the compliance to HIPAA. We delve deeper into implications of HIPAA on healthcare organizations and the information technology world.


Author(s):  
Sandip Bisui ◽  
Subhas Chandra Misra

This article discusses the issues and concerns related to the adoption of Personalized Medicine in modern healthcare system. In this chapter the authors have elaborated the critical challenges while adopting this new medicare system. The changes required for this adoption have also been discussed by the authors. They have also give a glimpse of the critical success factors and consumer trust concerns along with the privacy and security threats for the successful adoption of Personalized Medicine system.


Sign in / Sign up

Export Citation Format

Share Document