How Risky Are Real Users' IFTTT Applets?
Camille CobbMilijana SurbatovichAnna KawakamiMahmood SharifLujo BauerAnupam DasLimin JiaPublished in: SOUPS @ USENIX Security Symposium (2020)
Keyphrases
- end users
- user requirements
- user interface
- collaborative filtering
- information sources
- user interaction
- web content
- byte code
- data sets
- novice users
- user oriented
- internet users
- query formulation
- information overload
- recommendation systems
- user feedback
- rapid growth
- online communities
- daily life
- user profiles
- operating system
- social media
- expert systems
- digital libraries
- website
- real world