35 research outputs found

    A Design Space for Effective Privacy Notices.

    Get PDF
    ABSTRACT Notifying users about a system's data practices is supposed to enable users to make informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy poli cies, are often ineffective because they are neither usable nor useful, and are therefore ignored by users. Constrained interfaces on mobile devices, wearables, and smart home de vices connected in an Internet of Things exacerbate the is sue. Much research has studied usability issues of privacy notices and many proposals for more usable privacy notices exist. Yet, there is little guidance for designers and develop ers on the design aspects that can impact the effectiveness of privacy notices. In this paper, we make multiple contribu tions to remedy this issue. We survey the existing literature on privacy notices and identify challenges, requirements, and best practices for privacy notice design. Further, we map out the design space for privacy notices by identifying relevant dimensions. This provides a taxonomy and consistent ter minology of notice approaches to foster understanding and reasoning about notice options available in the context of specific systems. Our systemization of knowledge and the developed design space can help designers, developers, and researchers identify notice and choice requirements and de velop a comprehensive notice concept for their system that addresses the needs of different audiences and considers the system's limitations and opportunities for providing notice

    A Design Space for Effective Privacy Notices.

    Get PDF
    ABSTRACT Notifying users about a system's data practices is supposed to enable users to make informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy policies, are often ineffective because they are neither usable nor useful, and are therefore ignored by users. Constrained interfaces on mobile devices, wearables, and smart home devices connected in an Internet of Things exacerbate the issue. Much research has studied usability issues of privacy notices and many proposals for more usable privacy notices exist. Yet, there is little guidance for designers and developers on the design aspects that can impact the effectiveness of privacy notices. In this paper, we make multiple contributions to remedy this issue. We survey the existing literature on privacy notices and identify challenges, requirements, and best practices for privacy notice design. Further, we map out the design space for privacy notices by identifying relevant dimensions. This provides a taxonomy and consistent terminology of notice approaches to foster understanding and reasoning about notice options available in the context of specific systems. Our systemization of knowledge and the developed design space can help designers, developers, and researchers identify notice and choice requirements and develop a comprehensive notice concept for their system that addresses the needs of different audiences and considers the system's limitations and opportunities for providing notice

    Eikenella Corrodens Cervical Spinal Epidural Abscess Induced by a Fish Bone

    Get PDF
    Cervical spinal epidural abscess, caused by fish bone injury and a secondary infection by Eikenella Corrodens which is part of the normal flora, has not been reported. A 72-yr-old man came to the hospital with pain in his posterior neck and both shoulders for 2 months. He also was experiencing weakness on his right side for 3 days. A fish bone had been stuck in his throat for about 2 months. Neurological examination revealed right hemiparesis, hypesthesia on the left extremities and neck stiffness. Laboratory findings showed an elevated ESR/CRP and leukocytosis, and magnetic resonance imaging revealed a retropharyngeal abscess and cervical myelitis. The patient was treated with emergency surgical decompression and antibiotics. A fish bone was removed from the C3-C4 intervertebral disc space. In the culture of chocolate blood agar and 5% sheep blood agar plate, E. corrodens was detected as a causative organism

    Simple Nudges for Better Password Creation

    Get PDF
    Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudges in creating website-specific passwords: financial incentive (present vs absent), length instruction (long password vs no instruction) and stimulus (picture present vs not present). Mechanical Turk workers were asked to create a password in one of these conditions and the resulting passwords were evaluated based on character length, resistance to automated guessing attacks, and time taken to create the password. We found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction. Using a picture nudge to support password creation did not lead to passwords that were either longer or more resistant to attacks but did lead to account-specific passwords

    Mathematical tools in a digital world

    No full text
    There are many vantage points from which to gain a perspective on digital culture. The intersection of mathematics and mathematical tools with all things digital is one such vantage point. This implies an inspection of mathematical software. The broad lines that can be taken are the practice, education and application of mathematics. This thesis focuses on practice and application, disregarding education. With regards the former it is shown how the practice of mathematics itself has been affected by the increasingly pervasive computational nature of our world. From visualisation to theorem proving no area has been untouched. I programmed a subset of the fractal universe, L-Systems, into the thesis to demonstrate this. In the latter case those who apply mathematics have been aided by the automation of their tasks: be they engineers or academics or artists. I have focused on the recent growth in mathematical art to highlight this. Culture and ideology affect all areas of life, and the development of software is no exception. At heart are issues of control and freedom, lock-in and transparency. How one develops software can have ethical/pragmatic considerations, it can have legal ramifications, when we get into how mathematics software is used in science there are increasing epistemological issues, finally there are economic ones. First I looked backward in time to survey the history of copyright and intellectual property rights – then I considered how these frameworks operate in the software world. In order to compare and contrast free and open source mathematical software with proprietary software I composed a set of questionnaires and used the methodology of digital ethnography. In the end this meant talking to users and developers of the open-source Sage project and users and developers of the proprietary Mathematica package. I also gave a detailed overview of both systems prior to analysing the responses

    Shielding Journalist-“Bloggers”: The Need to Protect Newsgathering Despite the Distribution Medium

    Get PDF
    The failure to agree on a sufficiently narrow definition of journalist has stalled efforts to enact a federal shield law to legally protect reporter-source communications from compelled disclosure in federal court. The increasing use of the Internet in news coverage and the greater reliance by the public on the Internet as a news source creates further problems as to who should qualify for federal shield law protection. This iBrief argues that a functional definition of journalist can be created to shield journalists from compelled source disclosure so as to protect the free flow of information to the public, but limits must be set to prevent abuse of such protection
    corecore