Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices.
Yixin ZouKevin A. RoundyAcar TamersoySaurabh ShintreJohann RoturierFlorian SchaubPublished in: CHI (2020)
Keyphrases
- identity theft
- personal data
- personal information
- protection mechanisms
- individual privacy
- privacy protection
- data protection
- privacy policies
- privacy preserving
- malicious activities
- privacy violations
- private information
- service providers
- privacy concerns
- sensitive data
- data privacy
- third party
- data collection
- cyber crime
- information technology
- social networking
- data sharing
- e government
- privacy issues
- biometric template
- information systems
- intrusion detection
- anomaly detection
- disclosure risk
- security issues
- statistical databases
- sensitive information