Gallagher et al., 2017 - Google Patents
New Me: Understanding Expert and {Non-Expert} Perceptions and Usage of the Tor Anonymity NetworkGallagher et al., 2017
View PDF- Document ID
- 13387163867670092483
- Author
- Gallagher K
- Patil S
- Memon N
- Publication year
- Publication venue
- Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)
External Links
Snippet
Proper use of an anonymity system requires adequate understanding of how it functions. Yet, there is surprisingly little research that looks into user understanding and usage of anonymity software. Improper use stemming from a lack of sufficient knowledge of the …
- 238000011160 research 0 abstract description 17
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gallagher et al. | New Me: Understanding Expert and {Non-Expert} Perceptions and Usage of the Tor Anonymity Network | |
| Nissenbaum et al. | TrackMeNot: Resisting surveillance in web search | |
| Fire et al. | Online social networks: threats and solutions | |
| Mayer | Any person... a pamphleteer”: Internet Anonymity in the Age of Web 2.0 | |
| Chen et al. | Exploring internet security perceptions and practices in urban ghana | |
| Al-Turjman et al. | Security in social networks | |
| Rahman et al. | Frappe: detecting malicious facebook applications | |
| Shakarian et al. | Exploring malicious hacker forums | |
| McIntyre | Child abuse images and cleanfeeds: Assessing internet blocking systems | |
| Sadeghian et al. | Security threats in online social networks | |
| Schulz et al. | Human rights and encryption | |
| Hassan et al. | Digital privacy and security using Windows: A practical guide | |
| Samermit et al. | {“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators | |
| Ziccardi | Digital activism, internet control, transparency, censorship, surveillance and human rights: An international perspective | |
| Goutam | Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition) | |
| Kissell | Take control of your online privacy | |
| Bryant | The iron fist vs. the microchip | |
| Palfrey | The public and the private at the United States border with cyberspace | |
| Shelke et al. | Social networking: its uses and abuses | |
| Nekrasov et al. | A user-driven free speech application for anonymous and verified online, public group discourse | |
| Callanan et al. | Internet blocking | |
| Eneman | Internet service provider (ISP) filtering of child-abusive material: A critical reflection of its effectiveness | |
| Norman et al. | Security threats and techniques in social networking sites: a systematic literature review | |
| Gallagher | Measurement and improvement of the tor user experience | |
| Ali et al. | Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence |