1. bookVolume 2021 (2021): Issue 3 (July 2021)
Journal Details
License
Format
Journal
First Published
16 Apr 2015
Publication timeframe
4 times per year
Languages
English
access type Open Access

Awareness, Adoption, and Misconceptions of Web Privacy Tools

Published Online: 27 Apr 2021
Page range: 308 - 333
Received: 30 Nov 2020
Accepted: 16 Mar 2021
Journal Details
License
Format
Journal
First Published
16 Apr 2015
Publication timeframe
4 times per year
Languages
English
Abstract

Privacy and security tools can help users protect themselves online. Unfortunately, people are often unaware of such tools, and have potentially harmful misconceptions about the protections provided by the tools they know about. Effectively encouraging the adoption of privacy tools requires insights into people’s tool awareness and understanding. Towards that end, we conducted a demographically-stratified survey of 500 US participants to measure their use of and perceptions about five web browsing-related tools: private browsing, VPNs, Tor Browser, ad blockers, and antivirus software. We asked about participants’ perceptions of the protections provided by these tools across twelve realistic scenarios. Our thematic analysis of participants’ responses revealed diverse forms of misconceptions. Some types of misconceptions were common across tools and scenarios, while others were associated with particular combinations of tools and scenarios. For example, some participants suggested that the privacy protections offered by private browsing, VPNs, and Tor Browser would also protect them from security threats – a misconception that might expose them to preventable risks. We anticipate that our findings will help researchers, tool designers, and privacy advocates educate the public about privacy- and security-enhancing technologies.

Keywords

[1] Ruba Abu-Salma and Benjamin Livshits. Evaluating the End-User Experience of Private Browsing Mode. CHI ’20: CHI Conference on Human Factors in Computing Systems, April 2020.Search in Google Scholar

[2] Alessandro Acquisti, Manya Sleeper, Yang Wang, Shomir Wilson, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, and Florian Schaub. Nudges for Privacy and Security. ACM Computing Surveys, 50(3):1–41, August 2017.Search in Google Scholar

[3] Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, and Nhan Nguyen. “...better to use a lock screen than to worry about saving a few seconds of time” - Effect of Fear Appeal in the Context of Smartphone Locking Behavior. Symposium on Usable Privacy and Security, 2017.Search in Google Scholar

[4] Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Cranor, and Yuvraj Agarwal. Your location has been shared 5,398 times!: A field study on mobile app privacy nudging. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015.Search in Google Scholar

[5] Brooke Auxier, Lee Rainie, Monica Anderson, Andrew Perrin, Madhu Kumar, and Erica Turner. Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information: Pew Research Center. November 2019.Search in Google Scholar

[6] Maria Bada, Angela M. Sasse, and Jason R. C. Nurse. Cyber Security Awareness Campaigns: Why do they fail to change behaviour? arXiv preprint, January 2019.Search in Google Scholar

[7] Matthew Ball, Roderic Broadhurst, Alexander Niven, and Harshit Trivedi. Data Capture and Analysis of Darknet Markets. SSRN Electronic Journal, 2019. https://www.ssrn.com/abstract=3344936.Search in Google Scholar

[8] Sean Barnum, Michael Gegick, and C.C. Michael. Defense in Depth | CISA. https://us-cert.cisa.gov/bsi/articles/knowledge/principles/defense-in-depth, September 2005.Search in Google Scholar

[9] Adam Beautement, M. Angela Sasse, and Mike Wonham. The compliance budget: Managing security behaviour in organisations. In Proceedings of the 2008 Workshop on New Security Paradigms - NSPW ’08, pages 47–58, Lake Tahoe, California, USA, 2008. ACM Press. http://portal.acm.org/citation.cfm?doid=1595676.1595684.Search in Google Scholar

[10] Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. Misplaced Confidences: Privacy and the Control Paradox. Social Psychological and Personality Science, 4(3):340–347, May 2013. https://doi.org/10.1177/1948550612455931.Search in Google Scholar

[11] Jon Brodkin. Fake tech support scam is trouble for legitimate remote help company. https://arstechnica.com/information-technology/2013/11/fake-tech-support-scamis-trouble-for-legitimate-remote-help-company/, November 2013.Search in Google Scholar

[12] Dalvin Brown. Is streaming video from sketchy web-sites illegal? https://www.usatoday.com/story/tech/2019/12/16/can-get-arrested-streaming-illicit-movies-its-complicated/2662072001/, December 2019.Search in Google Scholar

[13] United States Census Bureau. Current Population Survey (CPS), 2018. https://www.census.gov/cps/data/cpstablecreator.html.Search in Google Scholar

[14] Karoline Busse, Julia Schäfer, and Matthew Smith. Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice. Symposium on Usable Privacy and Security, pages 116–136, August 2019.Search in Google Scholar

[15] Yinzhi Cao, Song Li, and Erik Wijmans. (Cross-)Browser Fingerprinting via OS and Hardware Level Features. Network and Distributed System Security Symposium, March 2017.Search in Google Scholar

[16] CISA. Tips | CISA. https://us-cert.cisa.gov/ncas/tips.Search in Google Scholar

[17] Cisco. 2013 Cisco Annual Security Report. January 2013.Search in Google Scholar

[18] Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. Informing the Design of a Personalized Privacy Assistant for the Internet of Things. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pages 1–13, Honolulu HI USA, April 2020. ACM. https://dl.acm.org/doi/10.1145/3313831.3376389.Search in Google Scholar

[19] Cyrus Farivar and Andrew Blankstein. Feds take down the world’s ’largest dark web child porn marketplace’. https://www.nbcnews.com/news/crime-courts/feds-take-down-world-s-largest-dark-web-child-porn-n1066511, October 2019.Search in Google Scholar

[20] Roger Dingledine. [tor-announce] Tor security advisory: Old Tor Browser Bundles vulnerable. https://lists.torproject.org/pipermail/tor-announce/2013-August/000089.html, August 2013.Search in Google Scholar

[21] Disconnect. Best privacy VPN app for iOS and Mac. Powerful protection with one tap., Sep 2020. https://disconnect.me.Search in Google Scholar

[22] DuckDuckGo. A Study on Private Browsing: Consumer Usage, Knowledge, and Thoughts. Whitepaper, January 2017.Search in Google Scholar

[23] Agnieszka Dutkowska-Zuk, Austin Hounsel, Andre Xiong, Marshini Chetty, Nick Feamster, Molly Roberts, and Brandon Stewart. Practicing Safe Browsing: Understanding How and Why University Students Use Virtual Private Networks. arXiv preprint, cs.HC, February 2020.Search in Google Scholar

[24] EFF. The Playpen Cases: Frequently Asked Questions. https://www.eff.org/pages/playpen-cases-frequently-asked-questions, August 2016.Search in Google Scholar

[25] EFF. Choosing the VPN That’s Right for You. https://ssd.eff.org/en/module/choosing-vpn-thats-right-you, March 2019.Search in Google Scholar

[26] E. Erdin, C. Zachor, and M. H. Gunes. How to Find Hidden Users: A Survey of Attacks on Anonymity Networks. IEEE Communications Surveys Tutorials, 17(4):2296–2316, Fourthquarter 2015.Search in Google Scholar

[27] ExpressVPN. How to Combine a VPN and Tor Browser for Online Anonymity. https://www.expressvpn.com/, October 2020.Search in Google Scholar

[28] FTC. Tech Support Scams. https://www.ftc.gov/tips-advice/business-center/small-businesses/cybersecurity/tech-support-scams, October 2018.Search in Google Scholar

[29] Kevin Gallagher, Sameer Patil, and Nasir D. Memon. New Me - Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. Symposium on Usable Privacy and Security, 2017.Search in Google Scholar

[30] Samuel Gibbs. Antivirus software is dead, says security expert at Symantec. http://www.theguardian.com/technology/2014/may/06/antivirus-software-fails-catch-attacks-security-expert-symantec, May 2014.Search in Google Scholar

[31] Dan Goodin. Millions exposed to malvertising that hid attack code in banner pixels. https://arstechnica.com/information-technology/2016/12/millions-exposed-tomalvertising-that-hid-attack-code-in-banner-pixels/, December 2016.Search in Google Scholar

[32] Dan Goodin. Malvertisers target Mac users with stegano-graphic code stashed in images. https://arstechnica.com/information-technology/2019/01/malvertisers-target-mac-uses-with-stenographic-code-stashed-in-images/, January 2019.Search in Google Scholar

[33] Yael Grauer. The impossible task of creating a “Best VPNs” list today | Ars Technica. https://arstechnica.com/information-technology/2016/06/aiming-for-anonymity-ars-assesses-the-state-of-vpns-in-2016/, June 2016.Search in Google Scholar

[34] Glenn Greenwald and Ewen MacAskill. NSA Prism program taps in to user data of Apple, Google and others. The Guardian, June 2013. https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.Search in Google Scholar

[35] Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor. Away From Prying Eyes - Analyzing Usage and Understanding of Private Browsing. SOUPS @ USENIX Security Symposium, 2018.Search in Google Scholar

[36] Cormac Herley. So long, and no thanks for the externalities - the rational rejection of security advice by users. NSPW, pages 133–144, 2009.Search in Google Scholar

[37] Cormac Herley. More Is Not the Answer. IEEE Security & Privacy, 12(1):14–19, 2014.Search in Google Scholar

[38] Aaron Holmes. The dark web turns 20 this month — here’s how it changed the world - Business Insider. https://www.businessinsider.com/dark-web-changed-the-world-black-markets-arab-spring-2020-3, March 2020.Search in Google Scholar

[39] Bryan Horling and Matthew Kulick. Personalized Search for everyone. https://googleblog.blogspot.com/2009/12/personalized-search-for-everyone.html, December 2009.Search in Google Scholar

[40] Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kaafar, and Vern Paxson. An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. IMC 2016, 2016.Search in Google Scholar

[41] Iulia Ion, Rob Reeder, and Sunny Consolvo. “...No one Can Hack My Mind” - Comparing Expert and Non-Expert Security Practices. Symposium on Usable Privacy and Security, 2015.Search in Google Scholar

[42] Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara B. Kiesler. “My Data Just Goes Everywhere - “ User Mental Models of the Internet and Implications for Privacy and Security. Symposium on Usable Privacy and Security, 2015.Search in Google Scholar

[43] Kaspersky. Disk and File Encryption, Sep 2020. https://www.kaspersky.com/enterprise-security/wiki-section/products/encryption.Search in Google Scholar

[44] Kaspersky Lab. The main sources of malware infection. https://web.archive.org/web/20201127210358/https://support.kaspersky.com/789, November 2018.Search in Google Scholar

[45] Katie Kasunic. How To Use Tor Browser: Everything You MUST Know (2020). https://www.vpnmentor.com/blog/tor-browser-work-relate-using-vpn/, August 2020.Search in Google Scholar

[46] Brian Krebs. Tools for a Safer PC — Krebs on Security. https://krebsonsecurity.com/tools-for-a-safer-pc/.Search in Google Scholar

[47] Brian Krebs. Krebs’s 3 Basic Rules for Online Safety — Krebs on Security. https://krebsonsecurity.com/2011/05/krebss-3-basic-rules-for-online-safety/, May 2011.Search in Google Scholar

[48] Brian Krebs. Post-FCC Privacy Rules, Should You VPN? — Krebs on Security, March 2017.Search in Google Scholar

[49] Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Cranor, Jason Hong, Mary Ann Blair, and Theodore Pham. School of phish: A real-word evaluation of anti-phishing training. In Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS ’09, Mountain View, California, 2009. ACM Press. http://portal.acm.org/citation.cfm?doid=1572532.1572536.Search in Google Scholar

[50] Ozan Kuru and Josh Pasek. Improving social media measurement in surveys: Avoiding acquiescence bias in Face-book research. Computers in Human Behavior, 57:82–92, April 2016. https://linkinghub.elsevier.com/retrieve/pii/S0747563215302788.Search in Google Scholar

[51] Pierre Laperdrix. Browser Fingerprinting: An Introduction and the Challenges Ahead | Tor Blog. https://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead, September 2019.Search in Google Scholar

[52] Selena Larson. Infant Social Security numbers are for sale on the dark web. https://money.cnn.com/2018/01/22/technology/infant-data-dark-web-identity-theft/index.html, January 2018.Search in Google Scholar

[53] Josephine Lau, Benjamin Zimmerman, and Florian Schaub. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW):1–31, November 2018. https://dl.acm.org/doi/10.1145/3274371.Search in Google Scholar

[54] Monica G. Maceli. Encouraging patron adoption of privacy-protection technologies: Challenges for public libraries. IFLA Journal, 44(3):195–202, August 2018.Search in Google Scholar

[55] James E Maddux and Ronald W Rogers. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of experimental social psychology, 19(5):469–479, 1983.Search in Google Scholar

[56] Nathan Malkin, Julia Bernd, Maritza Johnson, and Serge Egelman. “What Can’t Data Be Used For?”: Privacy Expectations about Smart TVs in the U.S. In Proceedings 3rd European Workshop on Usable Security, London, England, 2018. Internet Society. https://www.ndss-symposium.org/wp-content/uploads/2018/06/eurousec2018_16_Malkin_paper.pdf.Search in Google Scholar

[57] Jonathan R. Mayer and John C. Mitchell. Third-Party Web Tracking: Policy and Technology. 2012 IEEE Symposium on Security and Privacy, 2012.Search in Google Scholar

[58] Nora McDonald, Sarita Schoenebeck, and Andrea Forte. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proceedings of the ACM Human-Computer Interaction, August 2019.Search in Google Scholar

[59] Georg Merzdovnik, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, and Edgar Weippl. Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. 2017 IEEE European Symposium on Security and Privacy (EuroS&P), March 2017.Search in Google Scholar

[60] Moses Namara, Daricia Wilkinson, Kelly Caine, and Bart P. Knijnenburg. Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology. Proceedings on Privacy Enhancing Technologies, 2020(1):83–102, December 2019.Search in Google Scholar

[61] Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp. Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. Workshop on Usable Security, February 2014.Search in Google Scholar

[62] NordVPN. Block ads and malicious websites with Cyber-Sec, Sep 2020. https://nordvpn.com/features/cybersec/.Search in Google Scholar

[63] Norton. Norton Privacy Manager | How it works, Mar 2019. https://www.youtube.com/watch?v=iKsHl-uzVrU.Search in Google Scholar

[64] Norton. Browse the Internet securely with Norton Safe Web, Oct 2020. https://support.norton.com/sp/en/us/home/current/solutions/v19116982.Search in Google Scholar

[65] Norton. Norton Privacy Manager, Sep 2020. https://us.norton.com/norton-privacy-manager.Search in Google Scholar

[66] Norton. Norton Secure VPN, Sep 2020. https://us.norton.com/products/norton-secure-vpn.Search in Google Scholar

[67] Eyal Peer, Laura Brandimarte, Sonam Samat, and Alessandro Acquisti. Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. Journal of Experimental Social Psychology, 70(C):153–163, May 2017.Search in Google Scholar

[68] Nicole Perlroth. Tor Project, a Digital Privacy Group, Reboots With New Board (Published 2016). The New York Times, July 2016. https://www.nytimes.com/2016/07/14/technology/tor-project-a-digital-privacy-group-reboots-with-new-board.html.Search in Google Scholar

[69] Nathaniel Popper. The Tax Sleuth Who Took Down a Drug Lord. The New York Times, December 2015. https://www.nytimes.com/2015/12/27/business/dealbook/theunsung-tax-agent-who-put-a-face-on-the-silk-road.html.Search in Google Scholar

[70] Prolific Team. Representative Samples on Prolific. https://researcher-help.prolific.co/hc/en-gb/articles/360019236753-Representative-Samples-on-Prolific, March 2019.Search in Google Scholar

[71] Prolific Team. Reviewing submissions: How do I decide who to accept/reject?, May 2020. https://researcher-help.prolific.co/hc/en-gb/articles/360009092394-Reviewing-submissions-How-do-I-decide-who-to-accept-reject-.Search in Google Scholar

[72] ProtonVPN. Why use Tor over VPN. https://protonvpn.com/blog/tor-vpn/, July 2018.Search in Google Scholar

[73] E. Racine, P. Skeba, E. P. S. Baumer, and A. Forte. What are PETs for Privacy Experts and Non-experts? Symposium on Usable Privacy and Security, August 2020.Search in Google Scholar

[74] L. Rainie, S. Kiesler, R. Kang, and Mary Madden. Anonymity, Privacy, and Security Online. Pew Research Internet Project. 2013.Search in Google Scholar

[75] Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples. IEEE SP, 2019.Search in Google Scholar

[76] Elissa M Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle L Mazurek. A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. USENIX Security Symposium, pages 88–108, August 2020.Search in Google Scholar

[77] Robert W. Reeder, Iulia Ion, and Sunny Consolvo. 152 Simple Steps to Stay Safe Online - Security Advice for Non-Tech-Savvy Users. IEEE Secur. Priv., 15(5):55–64, 2017.Search in Google Scholar

[78] Consumer Reports. 66 Ways to Protect Your Privacy Right Now, February 2017.Search in Google Scholar

[79] Ronald W Rogers. A Protection Motivation Theory of Fear Appeals and Attitude Change. The Journal of Psychology, 91(1):93–114, 1975.Search in Google Scholar

[80] Ronald W Rogers and Steven Prentice-Dunn. Protection motivation theory. 1997.Search in Google Scholar

[81] Florian Schaub, Aditya Marella, Pranshu Kalvani, Blase Ur, Chao Pan, Emily Forney, and Lorrie Faith Cranor. Watching Them Watching Me: Browser Extensions Impact on User Privacy Awareness and Concern. Workshop on Usable Security, February 2016.Search in Google Scholar

[82] Daniel Smullen, Yuanyuan Feng, and Norman Sadeh. The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences. Proceedings on Privacy Enhancing Technologies, 1:195–215, 2020.Search in Google Scholar

[83] Ben Stegner. How to Avoid Fake Ads Disguised as Fake Download Links. https://www.makeuseof.com/tag/spot-avoid-ads-disguised-download-buttons/, July 2019.Search in Google Scholar

[84] Geordie Stewart and David Lacey. Death by a Thousand Facts - Criticising the Technocratic Approach to Information Security Awareness. HAISA, 2011.Search in Google Scholar

[85] Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, Norman M Sadeh, and Florian Schaub. From Intent to Action - Nudging Users Towards Secure Mobile Payments. SOUPS @ USENIX Security Symposium, 2020.Search in Google Scholar

[86] O. Sukwong, H. S. Kim, and J. C. Hoe. Commercial Antivirus Software Effectiveness - An Empirical Study. Computer, 44(3):63–70, 2011.Search in Google Scholar

[87] Xiao Hui Tai, Kyle Soska, and Nicolas Christin. Adversarial Matching of Dark Net Market Vendor Accounts. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pages 1871–1880, Anchorage AK USA, July 2019. ACM. https://dl.acm.org/doi/10.1145/3292500.3330763.Search in Google Scholar

[88] Karyn A. Temple. U.S. Copyright Office Responses To Specific Questions. https://troypoint.com/wp-content/uploads/2019/07/letter-to-senators-tillis-and-coons-on-felony-streaming-from-copyright-office.pdf, July 2019.Search in Google Scholar

[89] Richard H Thaler and Cass R Sunstein. Nudge: Improving Decisions About Health, Wealth, and Happiness. J. Wiley and Sons, 2008.Search in Google Scholar

[90] The Tor Project. Doc/TorPlusVPN – Tor Bug Tracker & Wiki. https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN, October 2019.Search in Google Scholar

[91] Matt Traudt. VPN + Tor: Not Necessarily a Net Gain -Matt Traudt. https://matt.traudt.xyz/posts/vpn-tor-notmRikAa4h.html, November 2016.Search in Google Scholar

[92] Rick Wash. Folk models of home computer security. Symposium on Usable Privacy and Security, pages 1–16, 2010.Search in Google Scholar

[93] Rick Wash and Emilee Rader. Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users. Eleventh Symposium On Usable Privacy and Security, pages 309–325, 2015.Search in Google Scholar

[94] Zachary Weinberg, Shinyoung Cho, Nicolas Christin, Vyas Sekar, and Phillipa Gill. How to Catch when Proxies Lie. IMC ’18: Internet Measurement Conference, October 2018.Search in Google Scholar

[95] WhatIsMyIPAddress.com. How does geolocation work? https://whatismyipaddress.com/geolocation, November 2020.Search in Google Scholar

[96] Wikipedia. Google Personalized Search. Wikipedia, April 2020. https://en.wikipedia.org/w/index.php?title=Google_Personalized_Search&oldid=952991366.Search in Google Scholar

[97] Wikipedia. Internet geolocation. Wikipedia, September 2020. https://en.wikipedia.org/w/index.php?title=Internet_geolocation&oldid=980936345.Search in Google Scholar

[98] Wikipedia. PRISM (surveillance program). Wikipedia, September 2020. https://en.wikipedia.org/w/index.php?title=PRISM_(surveillance_program)&oldid=978695563.Search in Google Scholar

[99] Jakob Wirth, Christian Maier, Sven Laumer, and Friedrich-Alexander Universität Erlangen-Nürnberg. The Influence Of Resignation On The Privacy Calculus In The Context Of Social Networking Sites: An Empirical Analysis. Twenty-Sixth European Conference on Information Systems, 2018.Search in Google Scholar

[100] Yixin Zou, Kevin Roundy, Acar Tamersoy, Saurabh Shintre, Johann Roturier, and Florian Schaub. Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices. CHI, pages 1–15, April 2020.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo