Karola Marky

ORCID: 0000-0001-7129-9642
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • User Authentication and Security Systems
  • Innovative Human-Technology Interaction
  • Tactile and Sensory Interactions
  • Internet Traffic Analysis and Secure E-voting
  • Interactive and Immersive Displays
  • Virtual Reality Applications and Impacts
  • Music Technology and Sound Studies
  • Advanced Malware Detection Techniques
  • Sexuality, Behavior, and Technology
  • Privacy-Preserving Technologies in Data
  • Augmented Reality Applications
  • Cryptography and Data Security
  • Gaze Tracking and Assistive Technology
  • Information and Cyber Security
  • Music and Audio Processing
  • AI in Service Interactions
  • Neuroscience and Music Perception
  • Personal Information Management and User Behavior
  • Hate Speech and Cyberbullying Detection
  • Digital Mental Health Interventions
  • Biometric Identification and Security
  • Digital and Cyber Forensics
  • Social Robot Interaction and HRI
  • Face recognition and analysis

Ruhr University Bochum
2023-2024

Technical University of Darmstadt
2016-2024

Leibniz University Hannover
2022-2023

University of Glasgow
2021-2022

Keio University
2019-2022

Fundamental to Augmented Reality (AR) headsets is their capacity visually and aurally sense the world around them, necessary drive positional tracking that makes rendering 3D spatial content possible. This requisite sensing also opens door for more advanced AR-driven activities, such as augmented perception, volumetric capture biometric identification - activities with potential expose bystanders significant privacy risks. Existing Privacy-Enhancing Technologies (PETs) often safeguard...

10.1145/3569501 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2022-12-21

IoT devices no longer affect single users only because others like visitors or family members - denoted as bystanders might be in the device's vicinity. Thus, data about can collected by and observe what output. To better understand how this affects privacy of device owners their protected better, we interviewed 42 young adults. Our results include that wish to adjust output when are present. Visitors made aware them, express needs, take measures. Based on our results, show demand for...

10.1145/3419249.3420164 article EN 2020-10-25

With the proliferation of room-scale Virtual Reality (VR), more and users install a VR system in their homes. When are VR, they usually completely immersed application. However, sometimes passersby invade these tracking spaces walk up to that currently try interact with them. As this either scares user or breaks user's immersion, research has yet find way seamlessly represent physical virtual worlds. In paper, we propose evaluate three different ways Environment using Augmented Virtuality....

10.1145/3322276.3322334 article EN 2019-06-18

Accurate sketching in virtual 3D environments is challenging due to aspects like limited depth perception or the absence of physical support. To address this issue, we propose VRSketchPen – a pen that uses two haptic modalities support without constraining user actions: (1) pneumatic force feedback simulate contact pressure against surfaces and (2) vibrotactile mimic textures while moving over surfaces. evaluate VRSketchPen, conducted lab experiment with 20 participants compare pneumatic,...

10.1145/3385956.3418953 article EN 2020-10-31

IoT devices can harvest personal information of any person in their surroundings and this includes data from visitors. Visitors often cannot protect privacy a foreign smart environment. This might be rooted poor awareness violations by devices, lack knowledge, or coping strategies. Thus, visitors are typically unaware being tracked means to influence which is collected about them. We interviewed 21 young adults investigate knowledge environments need wish able privacy. found that consider...

10.1145/3428361.3428464 article EN 2020-11-22

Abstract Smart Home technologies have the potential to increase quality of life, home security and facilitate elderly care. Therefore, they require access a plethora data about users’ homes private lives. Resulting privacy concerns form relevant barrier adopting this promising technology. Aiming support end informed decision-making through addressing we first conducted semi-structured interviews with 42 little-experienced users. Their diverse were clustered into four themes that center...

10.1515/icom-2019-0015 article EN i-com 2019-11-18

With head-mounted displays (HMDs), users can access and interact with a broad range of applications data. Although some this information is privacy-sensitive or even confidential, no intuitive, unobtrusive secure authentication technique available yet for HMDs. We present LookUnlock, an HMDs that uses passwords are composed spatial virtual targets. Through proof-of-concept implementation security evaluation, we demonstrate be efficiently used by people resistant to shoulder-surfing attacks.

10.1145/3290607.3312959 article EN 2019-04-30

In stage performances, an invisible wall in front of the often weakens connections between audience and performers. To amplify this performative connection, we present concept "Boiling Mind". Our design is based on streaming sensor data related to heart electrodermal activities from members integrating into staging elements, such as visual projections, music, lighting. Thus, internal states directly influence staging. Artists can have a more direct perception inner reactions create physical...

10.1145/3430524.3440653 article EN 2021-02-14

Two-factor authentication (2FA) is a recommended or imposed mechanism for valuable online assets. However, 2FA mechanisms usually exhibit user experience issues that create friction and even lead to poor acceptance, hampering the wider spread of 2FA. In this article, we investigate perceptions through in-depth interviews with 42 participants, revealing key requirements are not well met today despite recently emerged solutions. First, past experiences emphasizing problems aspects hamper good...

10.1145/3503514 article EN ACM Transactions on Computer-Human Interaction 2022-02-24

Two-factor authentication is a widely recommended security mechanism and already offered for different services. However, known methods physical realizations exhibit considerable usability customization issues. In this paper, we propose 3D-Auth, new concept of two-factor authentication. 3D-Auth based on customizable 3D-printed items that combine two factors in one object. The object bottom contains uniform grid conductive dots are connected to unique embedded structure inside the item. Based...

10.1145/3313831.3376189 article EN 2020-04-21

In spite of the great potential on-body vibrotactile displays for a variety applications, research lacks an understanding spacing between actuators. Through two experiments, we systematically investigate perception on wrist, forearm, upper arm, back, torso, thigh, and leg, each in transverse longitudinal body orientation. first experiment, address maximum distance vibration motors that still preserves ability to generate phantom sensations. second perceptual accuracy localizing vibrations...

10.1145/3432189 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2020-12-17

There are many contexts in which a person's face needs to be obfuscated for privacy, such as social media posts. We present user-centered analysis of the effectiveness DeepFakes obfuscation using synthetically generated faces, and compare it with state-of-the-art methods: blurring, masking, pixelating, replacement avatars. For this, we conducted an online survey (N=110) found that DeepFake is viable alternative methods; effective masking avatar concealing identities individuals photos. At...

10.1145/3531073.3531125 article EN 2022-06-06

The increasing number of smart devices installed in our homes poses privacy risks for inhabitants and visitors. However, individuals face difficulties counteracting intrusions due to missing controls, incorrect mental models, limitations their level expertise. We present PriKey, a concept device-independent easy-to-use tangible home mechanisms. PriKey is the key protection: it supports users taking control over through meaningful, interactions. Using Wizard-of-Oz prototype, we explored...

10.1145/3546155.3546640 article EN 2022-09-26

E-voting has been embraced by a number of countries, delivering benefits in terms efficiency and accessibility. End-to-end verifiable e-voting schemes facilitate verification the integrity individual votes during election process. In particular, methods for cast-as-intended enable voters to confirm that their cast have not manipulated voting client. A well-known technique effecting is Benaloh Challenge. The usability this challenge crucial because be actively engaged paper, we report on...

10.1145/3173574.3173750 article EN 2018-04-19

Learning a musical instrument requires regular exercise. However, students are often on their own during practice sessions due to the limited time with teachers, which increases likelihood of mislearning playing techniques. To address this issue, we present Let's Frets - modular guitar learning system that provides visual indicators and capturing finger positions 3D-printed capacitive fretboard. We based design requirements collected through in-depth interviews professional guitarists...

10.1145/3411764.3445595 article EN 2021-05-06

This paper proposes an Out-of-Device Privacy Scale (ODPS) - a reliable, validated psychometric privacy scale that measures users' importance of out-of-device privacy. In contrast to existing scales, ODPS is designed capture the individuals attribute protecting personal information from threats in physical world, which essential when designing protection mechanisms. We iteratively developed and refined three high-level steps: item development, validation, with total N=1378 participants. Our...

10.1145/3613904.3642623 article EN cc-by 2024-05-11

Internet voting can afford more inclusive and inexpensive elections. The flip side is that the integrity of election be compromised by adversarial attacks malfunctioning infrastructure. Individual verifiability aims to protect against such risks letting voters verify their votes are correctly registered in electronic ballot box. Therefore, need carry out additional tasks making human factors crucial for security. In this article, we establish a categorization individually verifiable schemes...

10.1145/3459604 article EN ACM Transactions on Computer-Human Interaction 2021-09-03

Supporting users with secure password creation is a well-explored yet unresolved research topic. A promising intervention the meter, i.e. providing feedback on user's strength as and when it created. However, findings related to meter's effectiveness are varied. An extensive literature review revealed that, besides feedback, effective meters often include: (a) nudges encourage stronger passwords choices (b) additional guidance. between-subjects study was carried out 645 participants test...

10.1080/0144929x.2022.2042384 article EN Behaviour and Information Technology 2022-03-01

The use of wearable sensor technology opens up exciting avenues for both art and HCI research, providing new ways to explore the invisible link between audience performer. To be effective, such work requires close collaboration performers researchers. In this article, we report on co-design process research insights from our integrating physiological sensing live performance. We connection audience’s data their experience during performance, analyzing a multi-modal dataset collected 98...

10.1145/3557887 article EN ACM Transactions on Computer-Human Interaction 2022-08-17

IoT devices deliver their functionality by accessing data. Users decide which data they are willing to share via privacy settings interfaces that typically on the device, or in app controlling it. Thus, users have interact with each device is time-consuming and might be overlooked. In this paper, we provide a stepping stone into multi-device interface for adjusting settings. We present three levels of information detail: 1) sensor name 2), about captured 3) detailed collected type including...

10.1145/3334480.3383016 article EN 2020-04-25

In this paper, we contribute an in-depth study of the mental models various roles in smart home ecosystems. particular, compared regarding data collection among residents (primary users) and visitors a qualitative (N=30) to better understand how their specific privacy needs can be addressed. Our results suggest that have limited understanding devices collect store sensitive about them. Misconceptions visitors' result missing awareness ultimately limit ability protect privacy. We discuss...

10.1145/3490632.3490664 article EN 2021-05-12

Thermal attacks refer to the possibility of capturing heat traces that result from interacting with user interfaces reveal sensitive input, such as passwords. The technical feasibility and effectiveness thermal have already been demonstrated. Yet, several preconditions be met for successful attacks. In this paper, we investigate awareness which extent attack's are in users' daily lives. We present results an online study 101 participants showing users frequently at risk based on their...

10.1145/3546155.3546706 article EN 2022-09-26

Personalized privacy assistants (PPAs) communicate privacy-related decisions of their users to Internet Things (IoT) devices. There are different ways implement PPAs by varying the degree autonomy or decision model. This paper investigates user perceptions PPA models and profiles – archetypes individual needs as a basis for in private environments (e.g., friend's home). We first explore how can be assigned propose an assignment method. Next, we investigate 18 usage scenarios with contexts,...

10.1145/3613904.3642591 article EN cc-by-sa 2024-05-11

Mobile phones are most likely the subject of targeted attacks, such as software exploits. The resources needed to carry out attacks becoming increasingly available and, hence, easily executable, putting users' privacy at risk. We conducted a systematic literature analysis understand relationship between and attack feasibility present categorisation social engineering side-channel on mobile focusing attackers require. Our proposed levels facilitate an in-depth understanding how phone can be...

10.1080/10447318.2024.2361519 article EN cc-by International Journal of Human-Computer Interaction 2024-06-12
Coming Soon ...