Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter.
Juliane SchmüserHarshini Sri RamuluNoah WöhlerChristian StranskyFelix BensmannDimitar DimitrovSebastian SchellhammerDominik WermkeStefan DietzeYasemin AcarSascha FahlPublished in: CHI (2024)
Keyphrases
- security issues
- statistical databases
- security concerns
- security mechanisms
- security and privacy issues
- personal data
- privacy issues
- preserving privacy
- data security
- privacy preserving
- security threats
- security risks
- information security
- personal information
- privacy requirements
- data privacy
- security problems
- sensitive data
- security properties
- rfid systems
- privacy concerns
- electronic payment
- secure multiparty computation
- social media
- protection mechanisms
- security requirements
- confidential information
- security services
- privacy enhancing
- access control
- authentication protocol
- social network sites
- biometric template
- border security
- cryptographic protocols
- security measures
- social networking
- private information
- individual privacy
- security policies
- policy enforcement
- intrusion detection
- electronic commerce
- security protocols
- outsourced databases
- third party
- online social networks
- electronic transactions
- network security
- sensitive information
- privacy preserving data mining
- user privacy
- identity management
- morphological analysis
- key management
- security analysis
- differential privacy
- semi honest
- cyber security
- data mining