A Typology of Perceived Triggers for End-User Security and Privacy Behaviors.
Sauvik DasLaura A. DabbishJason I. HongPublished in: SOUPS @ USENIX Security Symposium (2019)
Keyphrases
- end users
- security issues
- user friendliness
- statistical databases
- security concerns
- personal data
- security and privacy issues
- security properties
- security mechanisms
- data security
- preserving privacy
- privacy requirements
- privacy preserving
- sensitive data
- rfid systems
- application development
- secure multiparty computation
- confidential information
- security measures
- privacy issues
- service providers
- data privacy
- web applications
- security risks
- information security
- user acceptance
- privacy concerns
- user requirements
- security threats
- electronic payment
- identity management
- biometric template
- user experience
- security services
- user driven
- security requirements
- ubiquitous computing environments
- authentication protocol
- security policies
- business intelligence
- user interface
- outsourced databases
- privacy preserving data mining
- network security
- access control
- data providers
- differential privacy
- security analysis
- personal information
- security protocols
- private information
- information loss
- user satisfaction
- data mining