Alina Stöver

ORCID: 0009-0006-0941-595X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • User Authentication and Security Systems
  • Sexuality, Behavior, and Technology
  • Innovative Human-Technology Interaction
  • Internet Traffic Analysis and Secure E-voting
  • Mobile Crowdsensing and Crowdsourcing
  • Digital Innovation in Industries
  • Spam and Phishing Detection
  • Cybercrime and Law Enforcement Studies
  • Privacy-Preserving Technologies in Data
  • Diet and metabolism studies
  • Behavioral Health and Interventions
  • Persona Design and Applications
  • Sharing Economy and Platforms
  • Digital Communication and Language
  • Meat and Animal Product Quality
  • Psychology, Coaching, and Therapy
  • Social Media and Politics
  • Creativity in Education and Neuroscience
  • Muscle metabolism and nutrition
  • Corporate Management and Leadership
  • Advanced Malware Detection Techniques
  • Innovation, Technology, and Society
  • Sustainable Urban and Rural Development
  • Personal Information Management and User Behavior

Technical University of Darmstadt
2020-2025

Wheeling Jesuit University
2009

IoT devices no longer affect single users only because others like visitors or family members - denoted as bystanders might be in the device's vicinity. Thus, data about can collected by and observe what output. To better understand how this affects privacy of device owners their protected better, we interviewed 42 young adults. Our results include that wish to adjust output when are present. Visitors made aware them, express needs, take measures. Based on our results, show demand for...

10.1145/3419249.3420164 article EN 2020-10-25

Many EU data collectors rely on informed consent for processing, requiring users to after being informed. To do so, it is necessary have at least partially correct assumptions about what the software does. The introduction of official German contact tracing app, Corona-Warn-App (CWA), provides an interesting use case explore whether potential are capable with a reasonable amount effort by publishers software. We captured CWA users’ and non-users’ mental models collection processing in app...

10.1145/3716380 article EN other-oa ACM Transactions on Computer-Human Interaction 2025-02-12

Personal Privacy Assistants (PPAs) can support users in managing their privacy. Conducting a user study, we provide qualitative and quantitative insights into how imagine PPA PPAs designs appear for different groups. We highlight five aspects derived from the literature that are essential when designing PPA: What features should have? How learn users’ preferences? level of involvement its decisions Which vendor offer PPA? data willing to disclose Our results holistic view perceptions PPAs....

10.56553/popets-2023-0059 article EN cc-by Proceedings on Privacy Enhancing Technologies 2023-03-07

IoT devices deliver their functionality by accessing data. Users decide which data they are willing to share via privacy settings interfaces that typically on the device, or in app controlling it. Thus, users have interact with each device is time-consuming and might be overlooked. In this paper, we provide a stepping stone into multi-device interface for adjusting settings. We present three levels of information detail: 1) sensor name 2), about captured 3) detailed collected type including...

10.1145/3334480.3383016 article EN 2020-04-25

Many websites contain services from third parties. Misconfigurations of these can lead to missing compliance with legal obligations and privacy risks for website users. Previous research indicates that one cause such issues is awareness. However, reasons the awareness other prevalence are not widely researched; includes owners’ dealing those issues. To shed light on issue, we analyze 1043 responses owners a notification about issue their using thematic analysis, following an exploratory...

10.56553/popets-2023-0051 article EN cc-by Proceedings on Privacy Enhancing Technologies 2023-03-07

Legal frameworks rely on users to make an informed decision about data collection, e.g., by accepting or declining the use of tracking technologies. In practice, however, hardly interact with consent notices a deliberate website per level, but usually accept decline optional technologies altogether in habituated behavior. We explored potential three different nudge types (color highlighting, social cue, timer) and default settings interrupt this auto-response experimental between-subject...

10.1145/3617363 article EN ACM Transactions on Computer-Human Interaction 2023-08-23

Personalized privacy assistants (PPAs) communicate privacy-related decisions of their users to Internet Things (IoT) devices. There are different ways implement PPAs by varying the degree autonomy or decision model. This paper investigates user perceptions PPA models and profiles – archetypes individual needs as a basis for in private environments (e.g., friend's home). We first explore how can be assigned propose an assignment method. Next, we investigate 18 usage scenarios with contexts,...

10.1145/3613904.3642591 article EN cc-by-sa 2024-05-11

Misconfigurations and outdated software are a major cause of compromised websites data leaks. Past research has proposed evaluated sending automated security notifications to the operators misconfigured websites, but encountered issues with reachability, mistrust, perceived lack importance. In this paper, we seek understand determinants effective notifications. We identify protection misconfiguration that affects 12.7 % 1.3 million scanned opens them up legal liability. Using subset 4754...

10.48550/arxiv.2011.06260 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Mobile devices have become daily companions for millions of users. They access to privacy-sensitive data about their users which stresses the importance privacy. Users make privacy-related decisions already before app installation because once installed, apps can potential data. In this work-in-progress, we present an in-depth investigation privacy indicator visualizations mobile stores. We report results two consecutive user studies in investigate 1) visual depiction, 2) score, and 3)...

10.1145/3411763.3451791 article EN 2021-05-08

Choosing authentication schemes for a specific purpose is challenging service providers, developers, and researchers. Previous ratings of technical objective aspects showed that available all have strengths limitations. Yet, the security also relies on user perceptions which affect acceptance behaviour can deviate from aspects. To shine light issue support researchers, service-providers confronted with choice, we conducted an in-depth analysis password, fingerprint, smartphone-based scheme...

10.48550/arxiv.2209.13958 preprint EN cc-by-nc-nd arXiv (Cornell University) 2022-01-01

Abstract In this article, we highlight current research directions in the Technikpsychologie area, using example of interdisciplinary work FAI (Work and Engineering Psychology Research Group at Technical University Darmstadt) articles included special issue. To end, relate issue from areas road traffic planning (Hupfer et al.), usable IT security privacy solutions (Renaud), social aspects technically mediated communication (Diefenbach), human-centered interface design (Mucha aviation safety...

10.1007/s41449-023-00352-y article EN cc-by Zeitschrift für Arbeitswissenschaft 2023-02-01
Coming Soon ...