Skip to main content

Showing 1–7 of 7 results for author: Faklaris, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.02520  [pdf

    cs.HC

    Digital Privacy for Migrants: Exploring Current Research Trends and Future Prospects

    Authors: Sarah Tabassum, Cori Faklaris

    Abstract: This paper explores digital privacy challenges for migrants, analyzing trends from 2013 to 2023. Migrants face heightened risks such as government surveillance and identity theft. Understanding these threats is vital for raising awareness and guiding research towards effective solutions and policies to protect migrant digital privacy.

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: 18 pages, 1 figure

  2. arXiv:2401.14520  [pdf

    cs.CR cs.CY cs.HC

    Mitigating Smishing: Challenges and Future Work

    Authors: Cori Faklaris

    Abstract: This paper describes three principal challenges in smishing mitigation - limitations of device affordances, complexity of infrastructure, and cognitive and contextual factors of mobile device use. We give a high-level overview of ideas that can mitigate smishing and work around these challenges.

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: 5 pages. In submission to ConPro: 8th Workshop on Technology and Consumer Protection, co-located with the 45th IEEE Symposium on Security and Privacy, San Francisco, CA USA

  3. arXiv:2309.06322  [pdf

    cs.HC cs.CR cs.CY cs.SI

    Preliminary Results from a U.S. Demographic Analysis of SMiSh Susceptibility

    Authors: Cori Faklaris, Heather Richter Lipford, Sarah Tabassum

    Abstract: As adoption of mobile phones has skyrocketed, so have scams involving them. The text method is called SMiShing, (aka SMShing, or smishing) in which a fraudster sends a phishing link via Short Message Service (SMS) text to a phone. However, no data exists on who is most vulnerable to SMiShing. Prior work in phishing (its e-mail cousin) indicates that this is likely to vary by demographic and contex… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: 29 pages (18 without references and appendices). 12 figures, 7 tables. A version is in submission to CHI 2024

    ACM Class: H.5.2; H.1.2; H.4.3; J.4

  4. arXiv:2205.06937  [pdf

    cs.HC cs.CR

    Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption

    Authors: Cori Faklaris, Laura Dabbish, Jason I. Hong

    Abstract: Behavior change ideas from health psychology can also help boost end user compliance with security recommendations, such as adopting two-factor authentication (2FA). Our research adapts the Transtheoretical Model Stages of Change from health and wellness research to a cybersecurity context. We first create and validate an assessment to identify workers on Amazon Mechanical Turk who have not enable… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

    Comments: 41 pages, including the stage algorithm programmed on Mturk, the survey flow and specific items used, and a link to download the five informational handouts used for the control condition and the 2FA intervention conditions

    ACM Class: H.1.2; H.5.2; K.6.5

  5. arXiv:2204.03114  [pdf

    cs.CR cs.HC cs.SI

    Do They Accept or Resist Cybersecurity Measures? Development and Validation of the 13-Item Security Attitude Inventory (SA-13)

    Authors: Cori Faklaris, Laura Dabbish, Jason I. Hong

    Abstract: We present SA-13, the 13-item Security Attitude inventory. We develop and validate this assessment of cybersecurity attitudes by conducting an exploratory factor analysis, confirmatory factor analysis, and other tests with data from a U.S. Census-weighted Qualtrics panel (N=209). Beyond a core six indicators of Engagement with Security Measures (SA-Engagement, three items) and Attentiveness to Sec… ▽ More

    Submitted 6 April, 2022; originally announced April 2022.

    Comments: Includes the directions for administering the scales in an appendix

    ACM Class: H.1.2; I.3.6; J.4

  6. arXiv:2005.11957  [pdf, other

    cs.HC cs.CY

    Decentralized is not risk-free: Understanding public perceptions of privacy-utility trade-offs in COVID-19 contact-tracing apps

    Authors: Tianshi Li, Jackie, Yang, Cori Faklaris, Jennifer King, Yuvraj Agarwal, Laura Dabbish, Jason I. Hong

    Abstract: Contact-tracing apps have potential benefits in hel** health authorities to act swiftly to halt the spread of COVID-19. However, their effectiveness is heavily dependent on their installation rate, which may be influenced by people's perceptions of the utility of these apps and any potential privacy risks due to the collection and releasing of sensitive user data (e.g., user identity and locatio… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: 21 pages, 8 figures

    ACM Class: K.4.1; H.5.m

  7. An Exploration of User and Bystander Attitudes About Mobile Live-Streaming Video

    Authors: Cori Faklaris, Asa Blevins, Matthew O'Haver, Neha Singhal, Francesco Cafaro

    Abstract: Thanks to mobile apps such as Periscope and Facebook Live, live-streaming video is having a moment again. It has not been clear, however, to what extent the current ubiquity of smartphones is impacting this technology's acceptance in everyday social situations and how mobile contexts or affordances will affect and be affected by shifts in social norms and policy debates regarding privacy, surveill… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

    Comments: 12 pages

    ACM Class: K.4.0