- Privacy, Security, and Data Protection
- Artificial Intelligence in Law
- Digital and Cyber Forensics
- Privacy-Preserving Technologies in Data
- Law in Society and Culture
- Sexuality, Behavior, and Technology
- Ethics in Clinical Research
- Focus Groups and Qualitative Methods
- Law, AI, and Intellectual Property
- User Authentication and Security Systems
- Legal Education and Practice Innovations
- Ethics and Social Impacts of AI
- Advanced Malware Detection Techniques
- Persona Design and Applications
- Personal Information Management and User Behavior
- Behavioral Health and Interventions
- Spam and Phishing Detection
- Innovative Human-Technology Interaction
- Mental Health Research Topics
- Semantic Web and Ontologies
- Technology Use by Older Adults
- Digital Storytelling and Education
- AI in Service Interactions
- Multi-Agent Systems and Negotiation
- Digital Transformation in Law
University of Luxembourg
2018-2024
Scuola Superiore Sant'Anna
2023-2024
University of Bologna
2017-2023
University of Florence
2016
Cystic Fibrosis Research Foundation
2001
Max Delbrück Center
2001
Charité - Universitätsmedizin Berlin
2001
University of Verona
2001
British Lung Foundation
2001
University of Cagliari
1996
Online services pervasively employ manipulative designs (i.e., dark patterns) to influence users purchase goods and subscriptions, spend more time on-site, or mindlessly accept the harvesting of their personal data. To protect from lure such designs, we asked: are aware presence patterns? If so, they able resist them? By surveying 406 individuals, found that generally can exert on online behaviour. However, being does not equip with ability oppose influence. We further find respondents,...
Oftentimes information disclosures describing personal data-gathering research activities are so poorly designed that participants fail to be informed and blindly agree the terms, without grasping rights they can exercise risks derived from their cooperation. To respond challenge, this article presents a series of operational strategies for transparent communication in line with legal-ethical requirements. These "transparency-enhancing design patterns" implemented by data...
New language technologies are coming, thanks to the huge and competing private investment fuelling rapid progress; we can either understand foresee their effects, or be taken by surprise spend our time trying catch up. This report scketches out some transformative new that likely fundamentally change use of language. Some these may feel unrealistically futuristic far-fetched, but a central purpose this - wider LITHME network is illustrate mostly just logical development maturation currently...
A cookie banner pops up when a user visits website for the first time, requesting consent to use of cookies and other trackers variety purposes. Unlike prior work that has focused on evaluating interface (UI) design banners, this paper presents an in-depth analysis what banners say users get their consent. We took interdisciplinary approach determiningwhat should say. Following legal requirements ePrivacy Directive (ePD) General Data Protection Regulation (GDPR), we manually annotated around...
Growth hacking, particularly within the spectre of surveillance capitalism, has led to widespread use deceptive, manipulative, and coercive design techniques in last decade. These challenges exist at intersection many different technology professions that are rapidly evolving "shapeshifting" their practices confront emerging regulation. A wide range scholars have increasingly addressed these through label "dark patterns," describing content deceptive practices, ubiquity patterns contemporary...
Data Protection and Consenting Communication Mechanisms (DPCCMs) enable users to express their privacy decisions manage online consent. Thus, they can become a crucial means of protecting individuals' agency, thereby replacing the current problematic practices such as "consent dialogues". Based on an in-depth analysis different DPCCMs, we propose interdisciplinary set factors that be used for comparison mechanisms. Moreover, use results from qualitative expert study identify some main...
Design is a key player in the future of data privacy and protection. The General Data Protection Regulation (GDPR) established by European Union aims to rebalance information asymmetry between organizations that process personal individuals which refers. Machine-readable, standardized icons present “meaningful overview intended processing” are suggested law as tool enhance transparency addressed subjects. However, no specific guidelines have been provided, studies on iconography very few....
For the first time in history of European data protection law, use visualizations and especially icons is explicitly suggested as a way to improve comprehensibility information about handling practices provided subjects, which plays crucial role obtain informed consent. Privacy icon sets have already been developed, but they differ kinds depict perspectives embed. Moreover, not met widespread adoption, one reasons being that research has shown possibility misinterpretation these symbols. Our...
This article discusses the challenges of pseudonymizing unstructured, noisy social media data for cybersecurity research purposes and presents an open-source package developed to pseudonymize personal confidential information (i.e., names, companies, locations) contained in such data. Its goal is facilitate compliance with EU protection obligations upholding ethics principles like respect autonomy, privacy dignity participants, responsibility researchers, scientific integrity. We discuss...
The privacy engineering literature proposes requirements for the design of technologies but gives little guidance on how to correctly fulfil them in practice.On other hand, a growing number taxonomies document examples circumvent via "dark patterns," i.e., manipulative privacy-invasive interface designs.To improve actionability knowledge about dark patterns community, we matched selection existing classifications with ISO/IEC 29100:2011 standard Privacy Principles by performing an iterative...
Due to rapid technological advancements and the growing “datafication” of our societies, individuals’ privacy constitutes an increasingly explored speculative space for regulators, researchers, practitioners, designers artists. This article reports two experiences at a national international data protection authority (i.e., Commission Nationale de l'Informatique et des Libertés - CNIL European Data Protection Supervisor EDPS respectively), where foresight methods design are employed in...
Converging results have shown that adults benefit from congruent multisensory stimulation in the identification of complex stimuli, whereas developmental trajectory ability to integrate inputs children is less well understood. In this study we explored effects audiovisual semantic congruency on visually presented stimuli belonging different categories, using a cross-modal approach. Four groups ranging age 6 13 years and were administered an object task pictures living nonliving entities....