Tradeoffs in displaying peripheral information
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8 - Volume 8
Peripheral privacy notifications for wireless networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish
Proceedings of the 3rd symposium on Usable privacy and security
Measuring trust in wi-fi hotspots
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Sesame: informing user security decisions with system visualization
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy oracle: a system for finding application leaks with black box differential testing
Proceedings of the 15th ACM conference on Computer and communications security
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
School of phish: a real-world evaluation of anti-phishing training
Proceedings of the 5th Symposium on Usable Privacy and Security
Authenticating ubiquitous services: a study of wireless hotspot access
Proceedings of the 11th international conference on Ubiquitous computing
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy revelations for web and mobile apps
HotOS'13 Proceedings of the 13th USENIX conference on Hot topics in operating systems
Performance of networked applications: the challenges in capturing the user's perception
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack
Measuring and predicting web login safety
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack
Using data type based security alert dialogs to raise online security awareness
Proceedings of the Seventh Symposium on Usable Privacy and Security
Sensor tricorder: what does that sensor know about me?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Refactoring network infrastructure to improve manageability: a case study of home networking
ACM SIGCOMM Computer Communication Review
"Little brothers watching you": raising awareness of data leaks on smartphones
Proceedings of the Ninth Symposium on Usable Privacy and Security
Hi-index | 0.00 |
Anyone within range of an 802.11 wireless network ("Wi-Fi") can use free software to collect the unencrypted web traffic of others on the network. However, many Wi-Fi users are completely unaware of the risk that this creates. This work aims to improve users' awareness about what they expose to others on Wi-Fi networks and provide them with some control. Our system, the Wi-Fi Privacy Ticker, displays information about the exposure of sensitive terms that are sent to and from a user's computer and prevents the unencrypted transmission of terms from the user's computer that she has identified as highly sensitive. In a three-week field study with 17 participants, we found that the Wi-Fi Privacy Ticker improved participants' awareness of the circumstances in which their personal information is transmitted. We show that this heightened awareness contributed to changes in their behavior while on Wi-Fi.