Moses Namara

ORCID: 0000-0002-0099-8275
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Impact of Technology on Adolescents
  • Social Media and Politics
  • Internet Traffic Analysis and Secure E-voting
  • Hate Speech and Cyberbullying Detection
  • User Authentication and Security Systems
  • Sexuality, Behavior, and Technology
  • Technology Adoption and User Behaviour
  • Cybercrime and Law Enforcement Studies
  • Misinformation and Its Impacts
  • Human Resource and Talent Management
  • Spam and Phishing Detection
  • Digital Marketing and Social Media
  • Innovative Human-Technology Interaction
  • Higher Education and Employability
  • Privacy-Preserving Technologies in Data
  • Virtual Reality Applications and Impacts
  • African studies and sociopolitical issues
  • International Student and Expatriate Challenges
  • Vaccine Coverage and Hesitancy
  • African history and culture studies
  • Human-Automation Interaction and Safety
  • Innovation and Socioeconomic Development
  • Bullying, Victimization, and Aggression
  • COVID-19 epidemiological studies

Clemson University
2017-2023

Binghamton University
2021

University of Maryland, College Park
2016

Abstract Virtual Private Networks (VPNs) can help people protect their privacy. Despite this, VPNs are not widely used among the public. In this survey study about adoption and usage of VPNs, we investigate people’s motivation to use barriers they encounter in adopting them. Using data from 90 technologically savvy participants, find that while nearly all (98%; 88) participants have knowledge what are, less than half (42%; 37) ever primarily as a privacy-enhancing technology. Of these, 18%...

10.2478/popets-2020-0006 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2020-01-01

Teammates powered by artificial intelligence (AI) are becoming more prevalent and capable in their abilities as a teammate. While these teammates have great potential improving team performance, empirical work that explores the impacts of on humans they with is still its infancy. Thus, this study how inclusion AI both performative human-AI teams addition to perceptions those form. The current found participants perceiving third teammate performed worse than them human. Furthermore,...

10.1080/10447318.2022.2085191 article EN International Journal of Human-Computer Interaction 2022-07-01

One widespread, but frequently overlooked, source of security information is influencer marketing ads on YouTube for and privacy products such as VPNs. This paper examines how widespread these are, where they are found, what kind convey. Starting from a random sample 1.4% YouTube, we identify 243 videos containing VPN with total 63 million views. Using qualitative analysis, find that commonly discuss broad guarantees well specific technical features, focus internet threats, sometimes...

10.1109/sp46214.2022.9833633 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2022-05-01

Purpose The purpose of this paper is to investigate the motivations, concerns, benefits and consequences associated with non-use social media. In doing so, it extends Wyatt’s commonly used taxonomy by identifying new dimensions in which understand This framework encompasses a previously unidentified category that critical today’s media environment. Design/methodology/approach an exploratory interview study 17 self-identified non-users distributed across age groups socioeconomic backgrounds....

10.1108/intr-03-2017-0123 article EN Internet Research 2018-08-24

As our lives become increasingly digitized, how people maintain and manage their networked privacy has a formidable challenge for academics, practitioners, policy-makers. A shift toward people-centered initiatives shown promise; yet many applications still adopt "one-size fits all" approach, which fails to consider individual differences in concerns, preferences, behaviors shape different interact with use technology. The main goal of this workshop is highlight (e.g., age, culture, personal...

10.1145/3170427.3170617 article EN 2018-04-20

The African continent is making considerable strides to develop and implement technology-driven health innovations. Policymakers are increasingly acknowledging the rising concerns for online personal privacy data protection as advances in eHealth results increased levels of collection surveillance. In this paper, we propose a research agenda investigate effect cultural, constitutional, societal factors on preferences among different countries context healthcare technologies. addition helping...

10.1145/3283458.3283472 article EN 2018-12-03

End-to-end encryption is the best way to protect digital messages. Historically, end-to-end has been extremely difficult for people use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties convenience. The authors wanted understand how average users think about these tradeoffs. They conducted a 52-person user study and found that participants could learn of different models. Users also coherent...

10.1109/mic.2017.57 article EN IEEE Internet Computing 2017-05-01

Research shows that Facebook users differ extensively in their use of various privacy features, and they generally find it difficult to translate desired preferences into concrete interface actions. Our work explores the User-Tailored Privacy (UTP) adapt Facebook's features user's personal preferences. We developed adaptive versions 19 for each feature we test three adaptation methods (Automation, Highlight Suggestion) can be used implement behavior. In a "think-aloud" semistructured...

10.1109/pac.2018.00010 article EN 2018-09-01

Abstract Research finds that the users of Social Networking Sites (SNSs) often fail to comprehensively engage with plethora available privacy features— arguably due their sheer number and fact they are hidden from sight. As different likely interested in engaging subsets features, an SNS could improve management practices by adapting its interface a way proactively assists, guides, or prompts subset features most benefit from. Whereas recent work presents algorithmic implementations such...

10.2478/popets-2022-0031 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2021-11-20

Although older adults are increasingly adopting digital social technologies, a lack of knowledge and experience makes them vulnerable to privacy security threats. It is, therefore, crucial build education interventions that empower take more control over their privacy. Most tutorials support materials designed for the younger generations not necessarily as effective population. In this paper, we explore development suited learning styles adult We particularly develop span variety modalities...

10.56553/popets-2024-0036 article EN cc-by Proceedings on Privacy Enhancing Technologies 2023-10-22

Abstract Smartphone users are often unaware of mobile applications’ (“apps”) third-party data collection and sharing practices, which put them at higher risk privacy breaches. One way to raise awareness these practices is by providing unobtrusive but pervasive visualizations that can be presented in a glanceable manner. In this paper, we applied Wogalter et al.’s Communication-Human Information Processing model (C-HIP) design prototype eight different depict smartphone apps’ activities. We...

10.2478/popets-2020-0034 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2020-04-01

Online advertising on social media platforms has been at the center of recent controversies over growing concerns regarding users' privacy, dishonest data collection, and a lack transparency control. Facing public pressure, some have opted to implement explanatory tools in an effort empower consumers shed light marketing practices. Yet, date research shows significant inconsistencies around how ads should be explained. To address this issue, we conduct systematic literature review ad...

10.24251/hicss.2021.093 article EN Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2021-01-01

To raise awareness and communicate measures aimed at curbing the ongoing COVID-19 pandemic, Ugandan government used a combination of traditional social media platforms. This included nationally televised presidential addresses on early coping efforts. We examine impact these communications by using public Twitter data to explore Ugandans' experiences, conversations, engagement leading up to, during, after addresses. found that tweets from verified accounts received more user than...

10.1145/3448696.3448746 article EN cc-by 2021-03-08

The COVID-19 pandemic lockdown lead to the rapid adoption and use of various groupware applications ("apps'') for remote connection with colleagues, friends, family. Different factors such as user experiences, trust, social influences ("user-situational motivations'') were instrumental in determining how what apps people adopted used, especially at onset pandemic. In this empirical study, we examine these four predominant user-situational motivations (i.e., mandated an app by...

10.1145/3479549 article EN Proceedings of the ACM on Human-Computer Interaction 2021-10-13

Purpose The paper aims to develop and validate an instrument measure users’ perceptions of online personalized advertising. Design/methodology/approach First, we identified 12 different aspects advertisement formulated candidate items through a literature review. A card sorting study expert review were conducted generate the initial scale items. We then one survey ( n = 308) create reliable measurement another 296) instrument. Finally, tested how dimensions OPAD-Perception Framework can be...

10.1108/intr-01-2023-0078 article EN Internet Research 2024-11-08

End-to-end encryption is the best way to protect digital messages. Historically, end-to-end has been extremely difficult for people use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties convenience. We wanted understand how average users think about these tradeoffs. conducted a 52-person user study and found that participants could learn of different models. They also coherent assessments...

10.1109/mic.2017.265103059 article EN IEEE Internet Computing 2017-06-16

The prevalence of smartphones in our society warrants more research on understanding the characteristics users and their information privacy behaviors when using mobile apps. This paper investigates antecedents consequences "power use" (i.e., competence desire to use technology its fullest) context informational privacy. In a study with 380 Android users, we examined how gender users' education level influence power use, affects intention install apps share them versus actual based number...

10.1145/3481357.3481513 article EN 2021-10-11

Privacy has become an increasingly relevant topic in the field of social information systems. A recent book on Social Information Access (https://doi.org/10.1007/978-3-319-90092-6_2) includes a chapter this topic, authored by one instructors tutorial. Arguably, privacy is all more fields eGovernment and eDemocracy, which covers wide array sensitive topics such as eHealth, political discussion, access to government services. Notably, eDemocracy applications gather tremendous amounts user data...

10.1109/icedeg.2019.8734359 article EN 2019-04-01

In this article, we contemplate how African communities, based on their unique experiences and backgrounds, can increasingly become producers participants in the technology development process; a step beyond just being end-users.

10.1145/3368063 article EN XRDS Crossroads The ACM Magazine for Students 2019-11-25

Recent events have placed a renewed focus on the issue of racial justice in United States and other countries. One dimension this that has received considerable attention is security privacy threats vulnerabilities faced by communities color. Our study focuses community-level advocates who organize workshops, clinics, initiatives inform Black about existing digital safety ways to mitigate against them. Additionally, we aim understand online needs attitudes participants partake these...

10.48550/arxiv.2210.17511 preprint EN cc-by arXiv (Cornell University) 2022-01-01
Coming Soon ...