A first look into users' perceptions of facial recognition in the physical world
暂无分享,去创建一个
Mahdi N. Al-Ameen | Sovantharith Seng | Matthew Wright | M. N. Al-Ameen | M. Wright | Sovantharith Seng
[1] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[2] Jonathan Michelson,et al. Auto-tagging The Facebook , 2006 .
[3] E. Renold,et al. 'I wanna tell you a story': Exploring the application of vignettes in qualitative research with children and young people , 2000 .
[4] Timnit Gebru,et al. Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification , 2018, FAT.
[5] A. Moore. Privacy: Its Meaning and Value , 2003 .
[6] Eran Toch,et al. Evaluating Users' Perceptions about a System's Privacy: Differentiating Social and Institutional Aspects , 2019, SOUPS @ USENIX Security Symposium.
[7] Mahdi N. Al-Ameen,et al. Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study , 2019, CCS.
[8] V. Braun,et al. Using thematic analysis in psychology , 2006 .
[9] Navio Kwok,et al. Are Attention Check Questions a Threat to Scale Validity? , 2018 .
[10] Lujo Bauer,et al. Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements , 2020, CCS.
[11] Xiaoou Tang,et al. Surpassing Human-Level Face Verification Performance on LFW with GaussianFace , 2014, AAAI.
[12] Kirsten E. Martin. Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract , 2012 .
[13] Arun Ross,et al. Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.
[14] V. Kshirsagar,et al. Face recognition using Eigenfaces , 2011, 2011 3rd International Conference on Computer Research and Development.
[15] Blase Ur,et al. Do Users' Perceptions of Password Security Match Reality? , 2016, CHI.
[16] Kelly Gates,et al. The past perfect promise of facial recognition technology , 2004 .
[17] A. Acquisti,et al. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk , 2013, Behavior Research Methods.
[18] Lujo Bauer,et al. User Behaviors and Attitudes Under Password Expiration Policies , 2018, SOUPS @ USENIX Security Symposium.
[19] Elissa M. Redmiles,et al. How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior , 2016, CCS.
[20] Elissa M. Redmiles,et al. How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[21] Verena Zimmermann,et al. "If It Wasn't Secure, They Would Not Use It in the Movies" - Security Perceptions and User Acceptance of Authentication Technologies , 2017, HCI.
[22] Siddharth Suri,et al. Conducting behavioral research on Amazon’s Mechanical Turk , 2010, Behavior research methods.
[23] Alessandro Acquisti,et al. Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online , 2016, SOUPS.
[24] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.
[25] Lorrie Faith Cranor,et al. A Design Space for Effective Privacy Notices , 2015, SOUPS.
[26] J. Rubenfeld. The Right of Privacy , 1989 .
[27] Curtis R. Taylor,et al. The Economics of Privacy , 2016 .
[28] Kevin W. Bowyer,et al. Face recognition technology: security versus privacy , 2004, IEEE Technology and Society Magazine.
[29] Adam D. Moore,et al. Employee Monitoring and Computer Technology: Evaluative Surveillance V. Privacy , 2000, Business Ethics Quarterly.
[30] Panagiotis G. Ipeirotis,et al. Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.
[31] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[32] T. Ramayah,et al. Trust in Internet Banking in Malaysia and the Moderating Influence of Perceived Effectiveness of Biometrics Technology on Perceived Privacy and Security , 2017 .
[33] Sitalakshmi Venkatraman,et al. Biometrics in banking security: a case study , 2008, Inf. Manag. Comput. Secur..
[34] Laura A. Dabbish,et al. "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.
[35] J. Rachels. Why privacy is important , 1985 .
[36] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[37] Reza Mehmood,et al. Fingerprint Biometric Template Security Schemes: Attacks and Countermeasures , 2019 .
[38] Daniel M. Oppenheimer,et al. Instructional Manipulation Checks: Detecting Satisficing to Increase Statistical Power , 2009 .
[39] Karoline Mortensen,et al. Comparing Amazon’s Mechanical Turk Platform to Conventional Data Collection Methods in the Health and Medical Research Literature , 2018, Journal of General Internal Medicine.
[40] Lujo Bauer,et al. Privacy Expectations and Preferences in an IoT World , 2017, SOUPS.
[41] Swami Sankaranarayanan,et al. Face recognition accuracy of forensic examiners, superrecognizers, and face recognition algorithms , 2018, Proceedings of the National Academy of Sciences.
[42] L. D. Harmon,et al. Identification of human faces , 1971 .
[43] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[44] J. Finch. The Vignette Technique in Survey Research , 1987 .
[45] Panagiotis G. Ipeirotis. Analyzing the Amazon Mechanical Turk marketplace , 2010, XRDS.
[46] Richard E. Boyatzis,et al. Transforming Qualitative Information: Thematic Analysis and Code Development , 1998 .
[47] Anthony L. Ambrosio,et al. Multicultural Vignettes for Teacher Preparation , 2002 .
[48] Edward J. Bloustein,et al. Privacy as an Aspect of Human Dignity : An Answer to Dean Prosser , 1984 .
[49] Helen Nissenbaum,et al. Measuring Privacy: An Empirical Test Using Context To Expose Confounding Variables , 2015 .
[50] A. Moore. Privacy Rights: Moral and Legal Foundations , 2010 .
[51] Robert S. Boyer,et al. Woody Bledsoe - His Life and Legacy , 1996, AI Mag..
[52] Lorrie Faith Cranor,et al. How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices , 2016, SOUPS.
[53] Laura A. Dabbish,et al. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.
[54] Trevor Darrell,et al. Autotagging Facebook: Social network context improves photo annotation , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[55] Jesse Chandler,et al. Using Mechanical Turk to Study Clinical Populations , 2013 .
[56] Linda Little,et al. Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors , 2015, SOUPS.
[57] L. D. Harmon,et al. Man-machine interaction in human-face identification , 1972 .
[58] Patrick Gage Kelley. Conducting Usable Privacy & Security Studies with Amazon ’ s Mechanical Turk , 2010 .
[59] Adam D. Moore,et al. INTANGIBLE PROPERTY: PRIVACY, POWER, AND INFORMATION CONTROL , 1998 .
[60] G. Nagarajan,et al. Improving ATM security via face recognition , 2011, 2011 3rd International Conference on Electronics Computer Technology.