-
1
Exploring the influence of privacy awareness on the Privacy Paradox on smartwatches
Published 2018“…<p>While the public claim to be concerned about privacy, they rarely express protective behaviour. …”
Thesis -
2
Privacy salience: taxonomies and research opportunities
Published 2017“…Privacy is a well-understood concept in the physical world, with us all desiring some escape from the public gaze. …”
Journal article -
3
Future scenarios and challenges for security and privacy
Published 2016“…As our world becomes increasingly connected, it is critical we consider what implications current and future technologies have for security and privacy. We approach this challenge by surveying 30 predictions across industry, academia and international organisations to extract a number of common themes. …”
Conference item -
4
Perspectives on privacy in the use of online systems
Published 2016“…Our work considers this relationship in the context of privacy and the privacy expectations users have when using online systems. …”
Conference item -
5
-
6
The perfect storm: The privacy paradox and the Internet-of-Things
Published 2016“…<p>Privacy is a concept found throughout human history and opinion polls suggest that the public value this principle. …”
Conference item -
7
"Privacy is the boring Bit": User perceptions and behaviour in the Internet-of-Things
Published 2018“…In opinion polls, the public frequently claim to value their privacy. However, individuals often seem to overlook the principle, contributing to a disparity labelled the ‘Privacy Paradox’. …”
Conference item -
8
Optional data disclosure and the online privacy paradox: a UK perspective
Published 2016“…Opinion polls suggest that the public value their privacy, with majorities calling for greater control of their data. …”
Conference item -
9
A capability-oriented approach to assessing privacy risk in smart home ecosystems
Published 2018“…Smart devices are increasingly ubiquitous; the multitude of risks they pose to user privacy continues to grow, but assessing such risks has proven difficult. …”
Conference item -
10
Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home
Published 2016“…While these bring several advantages in terms of convenience and assisted living, security and privacy risks are also a concern. In this article, we consider this risk problem from the perspective of technology users in the smart home, and set out to provide a usable framework for modelling security and privacy risks. …”
Conference item -
11
Unwinding Ariadne's identity thread: Privacy risks with fitness trackers and online social networks
Published 2017“…The tool also illustrates the privacy risks that arise from information that people expose, which could be exploited by malicious parties such as fraudsters, stalkers and other online and offline criminals. …”
Conference item -
12
Android apps and privacy risks : what attackers can learn by sniffing mobile device traffic
Published 2014“…We also discovered that in some cases, improper application design rendered SSL encryption useless at preventing privacy leaks. We discuss ways in which an attacker can use both active and passive attacks to identify and track a user or invade their privacy. …”
Working paper -
13
A data−reachability model for elucidating privacy and security risks related to the use of online social networks
Published 2012“…Privacy and security within Online Social Networks (OSNs) has become a major concern over recent years. …”
Conference item -
14
A data−reachability model for elucidating privacy and security risks related to the use of online social networks
Published 2012Conference item -
15
Smart insiders: exploring the threat from insiders using the Internet-of-Things
Published 2016“…While there are substantial opportunities accompanying IoT, spanning from Healthcare to Energy, there are an equal number of concerns regarding the security and privacy of this plethora of ubiquitous devices. In this position paper we approach security and privacy in IoT from a different perspective to existing research, by considering the impact that IoT may have on the growing problem of insider threat within enterprises. …”
Conference item -
16
Investigating the leakage of sensitive personal and organisational information in email headers
Published 2015“…In this paper, we consider this topic of outgoing emails and unintentional information leakage to better appreciate the security and privacy concerns related to the simple activity of sending an email. …”
Journal article -
17
Using visualizations to enhance users’ understanding of app activities on Android devices
Published 2016“…The ever-increasing number of third-party applications developed for Android devices has resulted in a growing interest in the secondary activities that these applications perform and how they affect a user’s privacy. Unfortunately, users continue to install these applications without any concrete knowledge of the breadth of these activities; hence, they have little insight into the sensitive information and resources accessed by these applications. …”
Journal article -
18
Investigating the leakage of sensitive personal and organisational information in email headers
Published 2015“…In this paper, we consider this topic of outgoing emails and unintentional information leakage to better appreciate the security and privacy concerns related to the simple activity of sending an email. …”
Journal article -
19
Inferring Social Relationships from Technology−Level Device Connections
Published 2014“…A key motivation here is to better understand and elucidate the privacy risks associated with the digital footprints that we as humans (often inadvertently) create. …”
Conference item