Arianna Rossi

ORCID: 0000-0002-4199-5898
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Artificial Intelligence in Law
  • Digital and Cyber Forensics
  • Privacy-Preserving Technologies in Data
  • Law in Society and Culture
  • Sexuality, Behavior, and Technology
  • Ethics in Clinical Research
  • Focus Groups and Qualitative Methods
  • Law, AI, and Intellectual Property
  • User Authentication and Security Systems
  • Legal Education and Practice Innovations
  • Ethics and Social Impacts of AI
  • Advanced Malware Detection Techniques
  • Persona Design and Applications
  • Personal Information Management and User Behavior
  • Behavioral Health and Interventions
  • Spam and Phishing Detection
  • Innovative Human-Technology Interaction
  • Mental Health Research Topics
  • Semantic Web and Ontologies
  • Technology Use by Older Adults
  • Digital Storytelling and Education
  • AI in Service Interactions
  • Multi-Agent Systems and Negotiation
  • Digital Transformation in Law

University of Luxembourg
2018-2024

Scuola Superiore Sant'Anna
2023-2024

University of Bologna
2017-2023

University of Florence
2016

Cystic Fibrosis Research Foundation
2001

Max Delbrück Center
2001

Charité - Universitätsmedizin Berlin
2001

University of Verona
2001

British Lung Foundation
2001

University of Cagliari
1996

Online services pervasively employ manipulative designs (i.e., dark patterns) to influence users purchase goods and subscriptions, spend more time on-site, or mindlessly accept the harvesting of their personal data. To protect from lure such designs, we asked: are aware presence patterns? If so, they able resist them? By surveying 406 individuals, found that generally can exert on online behaviour. However, being does not equip with ability oppose influence. We further find respondents,...

10.1145/3461778.3462086 article EN Designing Interactive Systems Conference 2021-06-28

Oftentimes information disclosures describing personal data-gathering research activities are so poorly designed that participants fail to be informed and blindly agree the terms, without grasping rights they can exercise risks derived from their cooperation. To respond challenge, this article presents a series of operational strategies for transparent communication in line with legal-ethical requirements. These "transparency-enhancing design patterns" implemented by data...

10.1016/j.clsr.2020.105402 article EN cc-by Computer Law & Security Review 2020-03-06

New language technologies are coming, thanks to the huge and competing private investment fuelling rapid progress; we can either understand foresee their effects, or be taken by surprise spend our time trying catch up. This report scketches out some transformative new that likely fundamentally change use of language. Some these may feel unrealistically futuristic far-fetched, but a central purpose this - wider LITHME network is illustrate mostly just logical development maturation currently...

10.17011/jyx/reports/20210518/1 preprint EN cc-by 2021-05-18

A cookie banner pops up when a user visits website for the first time, requesting consent to use of cookies and other trackers variety purposes. Unlike prior work that has focused on evaluating interface (UI) design banners, this paper presents an in-depth analysis what banners say users get their consent. We took interdisciplinary approach determiningwhat should say. Following legal requirements ePrivacy Directive (ePD) General Data Protection Regulation (GDPR), we manually annotated around...

10.1145/3463676.3485611 preprint EN 2021-11-05

Growth hacking, particularly within the spectre of surveillance capitalism, has led to widespread use deceptive, manipulative, and coercive design techniques in last decade. These challenges exist at intersection many different technology professions that are rapidly evolving "shapeshifting" their practices confront emerging regulation. A wide range scholars have increasingly addressed these through label "dark patterns," describing content deceptive practices, ubiquity patterns contemporary...

10.1145/3544549.3583173 article EN 2023-04-19

Data Protection and Consenting Communication Mechanisms (DPCCMs) enable users to express their privacy decisions manage online consent. Thus, they can become a crucial means of protecting individuals' agency, thereby replacing the current problematic practices such as "consent dialogues". Based on an in-depth analysis different DPCCMs, we propose interdisciplinary set factors that be used for comparison mechanisms. Moreover, use results from qualitative expert study identify some main...

10.1109/eurospw55150.2022.00029 article EN 2022-06-01

Design is a key player in the future of data privacy and protection. The General Data Protection Regulation (GDPR) established by European Union aims to rebalance information asymmetry between organizations that process personal individuals which refers. Machine-readable, standardized icons present “meaningful overview intended processing” are suggested law as tool enhance transparency addressed subjects. However, no specific guidelines have been provided, studies on iconography very few....

10.1162/desi_a_00605 article EN Design Issues 2020-06-01

For the first time in history of European data protection law, use visualizations and especially icons is explicitly suggested as a way to improve comprehensibility information about handling practices provided subjects, which plays crucial role obtain informed consent. Privacy icon sets have already been developed, but they differ kinds depict perspectives embed. Moreover, not met widespread adoption, one reasons being that research has shown possibility misinterpretation these symbols. Our...

10.1109/cedem.2017.23 article EN 2017-05-01

This article discusses the challenges of pseudonymizing unstructured, noisy social media data for cybersecurity research purposes and presents an open-source package developed to pseudonymize personal confidential information (i.e., names, companies, locations) contained in such data. Its goal is facilitate compliance with EU protection obligations upholding ethics principles like respect autonomy, privacy dignity participants, responsibility researchers, scientific integrity. We discuss...

10.1109/eurospw55150.2022.00066 article EN 2022-06-01

The privacy engineering literature proposes requirements for the design of technologies but gives little guidance on how to correctly fulfil them in practice.On other hand, a growing number taxonomies document examples circumvent via "dark patterns," i.e., manipulative privacy-invasive interface designs.To improve actionability knowledge about dark patterns community, we matched selection existing classifications with ISO/IEC 29100:2011 standard Privacy Principles by performing an iterative...

10.5220/0012393100003648 article EN cc-by 2024-01-01

Due to rapid technological advancements and the growing “datafication” of our societies, individuals’ privacy constitutes an increasingly explored speculative space for regulators, researchers, practitioners, designers artists. This article reports two experiences at a national international data protection authority (i.e., Commission Nationale de l'Informatique et des Libertés - CNIL European Data Protection Supervisor EDPS respectively), where foresight methods design are employed in...

10.21606/drs.2022.681 article EN cc-by-nc Proceedings of DRS 2022-06-16

Converging results have shown that adults benefit from congruent multisensory stimulation in the identification of complex stimuli, whereas developmental trajectory ability to integrate inputs children is less well understood. In this study we explored effects audiovisual semantic congruency on visually presented stimuli belonging different categories, using a cross-modal approach. Four groups ranging age 6 13 years and were administered an object task pictures living nonliving entities....

10.1037/dev0000256 article EN Developmental Psychology 2016-11-28
Coming Soon ...