- Privacy, Security, and Data Protection
- Impact of Technology on Adolescents
- Social Media and Politics
- Internet Traffic Analysis and Secure E-voting
- Hate Speech and Cyberbullying Detection
- User Authentication and Security Systems
- Sexuality, Behavior, and Technology
- Technology Adoption and User Behaviour
- Cybercrime and Law Enforcement Studies
- Misinformation and Its Impacts
- Human Resource and Talent Management
- Spam and Phishing Detection
- Digital Marketing and Social Media
- Innovative Human-Technology Interaction
- Higher Education and Employability
- Privacy-Preserving Technologies in Data
- Virtual Reality Applications and Impacts
- African studies and sociopolitical issues
- International Student and Expatriate Challenges
- Vaccine Coverage and Hesitancy
- African history and culture studies
- Human-Automation Interaction and Safety
- Innovation and Socioeconomic Development
- Bullying, Victimization, and Aggression
- COVID-19 epidemiological studies
Clemson University
2017-2023
Binghamton University
2021
University of Maryland, College Park
2016
Abstract Virtual Private Networks (VPNs) can help people protect their privacy. Despite this, VPNs are not widely used among the public. In this survey study about adoption and usage of VPNs, we investigate people’s motivation to use barriers they encounter in adopting them. Using data from 90 technologically savvy participants, find that while nearly all (98%; 88) participants have knowledge what are, less than half (42%; 37) ever primarily as a privacy-enhancing technology. Of these, 18%...
Teammates powered by artificial intelligence (AI) are becoming more prevalent and capable in their abilities as a teammate. While these teammates have great potential improving team performance, empirical work that explores the impacts of on humans they with is still its infancy. Thus, this study how inclusion AI both performative human-AI teams addition to perceptions those form. The current found participants perceiving third teammate performed worse than them human. Furthermore,...
One widespread, but frequently overlooked, source of security information is influencer marketing ads on YouTube for and privacy products such as VPNs. This paper examines how widespread these are, where they are found, what kind convey. Starting from a random sample 1.4% YouTube, we identify 243 videos containing VPN with total 63 million views. Using qualitative analysis, find that commonly discuss broad guarantees well specific technical features, focus internet threats, sometimes...
Purpose The purpose of this paper is to investigate the motivations, concerns, benefits and consequences associated with non-use social media. In doing so, it extends Wyatt’s commonly used taxonomy by identifying new dimensions in which understand This framework encompasses a previously unidentified category that critical today’s media environment. Design/methodology/approach an exploratory interview study 17 self-identified non-users distributed across age groups socioeconomic backgrounds....
As our lives become increasingly digitized, how people maintain and manage their networked privacy has a formidable challenge for academics, practitioners, policy-makers. A shift toward people-centered initiatives shown promise; yet many applications still adopt "one-size fits all" approach, which fails to consider individual differences in concerns, preferences, behaviors shape different interact with use technology. The main goal of this workshop is highlight (e.g., age, culture, personal...
The African continent is making considerable strides to develop and implement technology-driven health innovations. Policymakers are increasingly acknowledging the rising concerns for online personal privacy data protection as advances in eHealth results increased levels of collection surveillance. In this paper, we propose a research agenda investigate effect cultural, constitutional, societal factors on preferences among different countries context healthcare technologies. addition helping...
End-to-end encryption is the best way to protect digital messages. Historically, end-to-end has been extremely difficult for people use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties convenience. The authors wanted understand how average users think about these tradeoffs. They conducted a 52-person user study and found that participants could learn of different models. Users also coherent...
Research shows that Facebook users differ extensively in their use of various privacy features, and they generally find it difficult to translate desired preferences into concrete interface actions. Our work explores the User-Tailored Privacy (UTP) adapt Facebook's features user's personal preferences. We developed adaptive versions 19 for each feature we test three adaptation methods (Automation, Highlight Suggestion) can be used implement behavior. In a "think-aloud" semistructured...
Abstract Research finds that the users of Social Networking Sites (SNSs) often fail to comprehensively engage with plethora available privacy features— arguably due their sheer number and fact they are hidden from sight. As different likely interested in engaging subsets features, an SNS could improve management practices by adapting its interface a way proactively assists, guides, or prompts subset features most benefit from. Whereas recent work presents algorithmic implementations such...
Although older adults are increasingly adopting digital social technologies, a lack of knowledge and experience makes them vulnerable to privacy security threats. It is, therefore, crucial build education interventions that empower take more control over their privacy. Most tutorials support materials designed for the younger generations not necessarily as effective population. In this paper, we explore development suited learning styles adult We particularly develop span variety modalities...
Abstract Smartphone users are often unaware of mobile applications’ (“apps”) third-party data collection and sharing practices, which put them at higher risk privacy breaches. One way to raise awareness these practices is by providing unobtrusive but pervasive visualizations that can be presented in a glanceable manner. In this paper, we applied Wogalter et al.’s Communication-Human Information Processing model (C-HIP) design prototype eight different depict smartphone apps’ activities. We...
Online advertising on social media platforms has been at the center of recent controversies over growing concerns regarding users' privacy, dishonest data collection, and a lack transparency control. Facing public pressure, some have opted to implement explanatory tools in an effort empower consumers shed light marketing practices. Yet, date research shows significant inconsistencies around how ads should be explained. To address this issue, we conduct systematic literature review ad...
To raise awareness and communicate measures aimed at curbing the ongoing COVID-19 pandemic, Ugandan government used a combination of traditional social media platforms. This included nationally televised presidential addresses on early coping efforts. We examine impact these communications by using public Twitter data to explore Ugandans' experiences, conversations, engagement leading up to, during, after addresses. found that tweets from verified accounts received more user than...
The COVID-19 pandemic lockdown lead to the rapid adoption and use of various groupware applications ("apps'') for remote connection with colleagues, friends, family. Different factors such as user experiences, trust, social influences ("user-situational motivations'') were instrumental in determining how what apps people adopted used, especially at onset pandemic. In this empirical study, we examine these four predominant user-situational motivations (i.e., mandated an app by...
Purpose The paper aims to develop and validate an instrument measure users’ perceptions of online personalized advertising. Design/methodology/approach First, we identified 12 different aspects advertisement formulated candidate items through a literature review. A card sorting study expert review were conducted generate the initial scale items. We then one survey ( n = 308) create reliable measurement another 296) instrument. Finally, tested how dimensions OPAD-Perception Framework can be...
End-to-end encryption is the best way to protect digital messages. Historically, end-to-end has been extremely difficult for people use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties convenience. We wanted understand how average users think about these tradeoffs. conducted a 52-person user study and found that participants could learn of different models. They also coherent assessments...
The prevalence of smartphones in our society warrants more research on understanding the characteristics users and their information privacy behaviors when using mobile apps. This paper investigates antecedents consequences "power use" (i.e., competence desire to use technology its fullest) context informational privacy. In a study with 380 Android users, we examined how gender users' education level influence power use, affects intention install apps share them versus actual based number...
Privacy has become an increasingly relevant topic in the field of social information systems. A recent book on Social Information Access (https://doi.org/10.1007/978-3-319-90092-6_2) includes a chapter this topic, authored by one instructors tutorial. Arguably, privacy is all more fields eGovernment and eDemocracy, which covers wide array sensitive topics such as eHealth, political discussion, access to government services. Notably, eDemocracy applications gather tremendous amounts user data...
In this article, we contemplate how African communities, based on their unique experiences and backgrounds, can increasingly become producers participants in the technology development process; a step beyond just being end-users.
Recent events have placed a renewed focus on the issue of racial justice in United States and other countries. One dimension this that has received considerable attention is security privacy threats vulnerabilities faced by communities color. Our study focuses community-level advocates who organize workshops, clinics, initiatives inform Black about existing digital safety ways to mitigate against them. Additionally, we aim understand online needs attitudes participants partake these...