[go: up one dir, main page]

Gallagher et al., 2017 - Google Patents

New Me: Understanding Expert and {Non-Expert} Perceptions and Usage of the Tor Anonymity Network

Gallagher et al., 2017

View PDF
Document ID
13387163867670092483
Author
Gallagher K
Patil S
Memon N
Publication year
Publication venue
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)

External Links

Snippet

Proper use of an anonymity system requires adequate understanding of how it functions. Yet, there is surprisingly little research that looks into user understanding and usage of anonymity software. Improper use stemming from a lack of sufficient knowledge of the …
Continue reading at www.usenix.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Gallagher et al. New Me: Understanding Expert and {Non-Expert} Perceptions and Usage of the Tor Anonymity Network
Nissenbaum et al. TrackMeNot: Resisting surveillance in web search
Fire et al. Online social networks: threats and solutions
Mayer Any person... a pamphleteer”: Internet Anonymity in the Age of Web 2.0
Chen et al. Exploring internet security perceptions and practices in urban ghana
Al-Turjman et al. Security in social networks
Rahman et al. Frappe: detecting malicious facebook applications
Shakarian et al. Exploring malicious hacker forums
McIntyre Child abuse images and cleanfeeds: Assessing internet blocking systems
Sadeghian et al. Security threats in online social networks
Schulz et al. Human rights and encryption
Hassan et al. Digital privacy and security using Windows: A practical guide
Samermit et al. {“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators
Ziccardi Digital activism, internet control, transparency, censorship, surveillance and human rights: An international perspective
Goutam Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition)
Kissell Take control of your online privacy
Bryant The iron fist vs. the microchip
Palfrey The public and the private at the United States border with cyberspace
Shelke et al. Social networking: its uses and abuses
Nekrasov et al. A user-driven free speech application for anonymous and verified online, public group discourse
Callanan et al. Internet blocking
Eneman Internet service provider (ISP) filtering of child-abusive material: A critical reflection of its effectiveness
Norman et al. Security threats and techniques in social networking sites: a systematic literature review
Gallagher Measurement and improvement of the tor user experience
Ali et al. Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence