How WEIRD is Usable Privacy and Security Research?
Ayako Akiyama HasegawaDaisuke InoueMitsuaki AkiyamaPublished in: USENIX Security Symposium (2024)
Keyphrases
- security issues
- statistical databases
- security concerns
- data security
- preserving privacy
- privacy preserving
- personal data
- security properties
- security risks
- information security
- security mechanisms
- security threats
- secure multiparty computation
- security requirements
- privacy issues
- security and privacy issues
- sensitive data
- rfid systems
- privacy concerns
- data privacy
- security policies
- confidential information
- access control
- electronic payment
- privacy requirements
- security measures
- protection mechanisms
- security services
- authentication protocol
- personal information
- security problems
- privacy enhancing
- identity management
- private information
- security management
- individual privacy
- privacy preservation
- network security
- intrusion detection
- biometric template
- security protocols
- privacy preserving data mining
- security systems
- security analysis
- smart card
- policy enforcement
- mutual authentication
- information leakage
- data protection
- cloud computing
- encryption key
- cryptographic protocols
- sensitive information