SPICE Publications


[ Publications of year 2022 ]

Conference publications (8)
  1. Laura Schneider, Pnina Fichman, and Ece Gumusel. Online Disinhibition in Global Imagined Communities During COVID-19 Lockdown. In , May 2022.
    Keywords: COVID-19, Lockdown, Facebook groups, Social media, Online disinhibition, Imagined Communities.
    @InProceedings{ schneidercovid2022,
    title = {Online Disinhibition in Global Imagined Communities During COVID-19 Lockdown},
    author = {Schneider, Laura and Fichman, Pnina and Gumusel, Ece},
    howpublished = {ECSM, 9th European Conference on Social Media Proceedings},
    month = {May},
    year = {2022},
    keywords = "COVID-19, Lockdown, Facebook groups, Social media, Online disinhibition, Imagined Communities" }


  2. Ece Gumusel. Preliminary Analysis of Data Subject Right Effectiveness and Blockages in Industry. In , March 2022.
    Keywords: privacy, information policy, information ethics.
    @InProceedings{ gumusel2022databroker,
    title = {Preliminary Analysis of Data Subject Right Effectiveness and Blockages in Industry},
    author = {Gumusel, Ece},
    howpublished = {Poster at iConference 2022 Proceedings},
    url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3991237},
    month = {March},
    year = {2022},
    keywords = "privacy, information policy, information ethics" }


  3. Jacob Abbott, Jayati Dev, Donginn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana Ringenberg, Vafa Andalibi, and L. Jean Camp. Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home. In Proceedings of the 2022 European Symposium on Usable Security, EuroUSEC '22, New York, NY, USA, pages 98–110, 2022. Association for Computing Machinery.
    Keywords: Security, user interviews, smart home, IoT, 2FA, privacy.
    @InProceedings{ abbott2022privacy,
    author = {Abbott, Jacob and Dev, Jayati and Kim, Donginn and Gopavaram, Shakthidhar and Iyer, Meera and Sadam, Shivani and Mare, Shrirang and Ringenberg, Tatiana and Andalibi, Vafa and Camp, L. Jean},
    title = {Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home},
    year = {2022},
    isbn = {9781450397001},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi-org.proxyiub.uits.iu.edu/10.1145/3549015.3554205},
    doi = {10.1145/3549015.3554205},
    abstract = {Studies of privacy perception in the Internet of Things (IoT) include in-laboratory evaluations as well as investigations of purchase decisions, deployment, and long-term use. In this study, we implemented identical IoT configurations in eight households to evaluate the installation and privacy concerns in the early adoption of IoT devices in our participants’ homes. The specific contributions of this work are insights into privacy perceptions of and challenges to the adoption of networked smart home devices and privacy management of IoT devices. The focus in this work was on participants’ privacy concerns about devices deployed in an IoT ecosystem influencing their gradual change of use. We detail how we use a three-week longitudinal interview protocol to compare user perceptions of privacy risk. We assessed users’ comfort with devices, perceived benefits, and data sensitivity. We discuss the factors identified by participants as relevant to their personal security and privacy management of in-home devices. We close with recommendations for privacy preserving smart home devices grounded in our participants’ experiences.},
    booktitle = {Proceedings of the 2022 European Symposium on Usable Security},
    pages = {98–110},
    numpages = {13},
    keywords = {Security, user interviews, smart home, IoT, 2FA, privacy},
    location = {Karlsruhe, Germany},
    series = {EuroUSEC '22} }


  4. Jacob Abbott, Jofish Kaye, and James Clawson. Identifying an Aurally Distinct Phrase Set for Text Entry Techniques. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, CHI '22, New York, NY, USA, 2022. Association for Computing Machinery.
    Keywords: text-to-speech, accessibility, text entry, TTS, synthesized speech, input techniques.
    Abstract: In the last decade, interest in accessible and eyes-free text entry has continued to grow. However, little research has been done to explore the feasibility of using audibly distinct phrases for text entry tasks. To better understand whether preexisting phrases used in text entry research are sufficiently distinct for eyes-free text entry tasks, we used Microsoft’s and Apple’s desktop text-to-speech systems to generate all 500 phrases from MacKenzie and Soukoreff’s set [32] using the default male and female voices. We then asked 392 participants recruited through Amazon’s Mechanical Turk to transcribe the generated audio clips. We report participant transcription errors and present the 96 phrases that were observed with no comprehension errors. These phrases were further tested with 80 participants who identified as low-vision and/or blind recruited through Twitter. We contribute the 92 phrases that were observed to maintain no comprehension errors across both experiments.

    @InProceedings{ abbott2022identifying,
    author = {Abbott, Jacob and Kaye, Jofish and Clawson, James},
    title = {Identifying an Aurally Distinct Phrase Set for Text Entry Techniques},
    year = {2022},
    isbn = {9781450391573},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3491102.3501897},
    doi = {10.1145/3491102.3501897},
    abstract = {In the last decade, interest in accessible and eyes-free text entry has continued to grow. However, little research has been done to explore the feasibility of using audibly distinct phrases for text entry tasks. To better understand whether preexisting phrases used in text entry research are sufficiently distinct for eyes-free text entry tasks, we used Microsoft’s and Apple’s desktop text-to-speech systems to generate all 500 phrases from MacKenzie and Soukoreff’s set [32] using the default male and female voices. We then asked 392 participants recruited through Amazon’s Mechanical Turk to transcribe the generated audio clips. We report participant transcription errors and present the 96 phrases that were observed with no comprehension errors. These phrases were further tested with 80 participants who identified as low-vision and/or blind recruited through Twitter. We contribute the 92 phrases that were observed to maintain no comprehension errors across both experiments.},
    booktitle = {Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems},
    articleno = {467},
    numpages = {13},
    keywords = {text-to-speech, accessibility, text entry, TTS, synthesized speech, input techniques},
    location = {New Orleans, LA, USA},
    series = {CHI '22} }


  5. Peter Caven, Shakthi Gopavaram, and L. Jean Camp. Integrating Human Intelligence to Bypass Information Asymmetry In Procurement Decision Making. In MILCOM, 2022.
    Keywords: Labels, SBOM.
    @InProceedings{ covensok22,
    title = {Integrating Human Intelligence to Bypass Information Asymmetry In Procurement Decision Making},
    author = {Caven, Peter and Gopavaram, Shakthi and Camp, L. Jean},
    booktitle = {MILCOM},
    location = {Rockville, MD},
    year = {2022},
    keywords = {Labels, SBOM} }


  6. Ece Gumusel, Vincent Q Malic, Devan Ray Donaldson, Kevin Ashley, and Xiaozhong Liu. An Annotation Schema for the Detection of Social Bias in Legal Text Corpora. In In iConference 2022 Proceedings, 2022.
    Keywords: Artificial intelligence, Information ethics, Machine learning, Natural language processing.
    @InProceedings{ gumusel2022legal,
    title = { An Annotation Schema for the Detection of Social Bias in Legal Text Corpora},
    author = {Gumusel, Ece and Malic, Vincent Q and Donaldson, Devan Ray and Ashley, Kevin and Liu, Xiaozhong},
    booktitle = {In iConference 2022 Proceedings},
    year = {2022},
    keywords = "Artificial intelligence, Information ethics, Machine learning, Natural language processing" }


  7. Joshua Streiff, Naheem Noah, and Sanchari Das. A Call for a New Privacy and Security Regime for IoT Smart Toys. In IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), 2022. IEEE.
    Keywords: IoT.
    @InProceedings{ streiff2022_ieee_dsc,
    title = {A Call for a New Privacy and Security Regime for IoT Smart Toys},
    author = {Streiff, Joshua and Noah, Naheem and Das, Sanchari},
    booktitle = {IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022)},
    year = {2022},
    keywords = {IoT},
    organization = {IEEE} }


  8. Zitao Zhang, Jacob Abbott, Sanchari Das, and L. Jean Camp. Building an Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement. In TPRC 2022: The 50th Research Conference on Communication, Information and Internet Policy, 2022. Social Science Research Network.
    Keywords: Security, UX, 2FA.
    @InProceedings{ zhang2022building,
    author = {Zhang, Zitao and Abbott, Jacob and Das, Sanchari and Camp, L. Jean},
    title = {Building an Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement},
    year = {2022},
    publisher = {Social Science Research Network},
    url = {https://ssrn.com/abstract=4177411},
    keywords = {Security, UX, 2FA},
    booktitle = {TPRC 2022: The 50th Research Conference on Communication, Information and Internet Policy} }


Posters and Presentations (1)
  1. Joshua Streiff, Tatiana Ringenberg, Jayati Dev, and L.Jean Camp. Everyone’s Flag: Using Entry Level Capture the Flag to Engage Low SES Student Groups. ECGBL, October 2022.
    Keywords: IoT.
    @Misc{ streiff2022_ecgbl_poster,
    title = "Everyone’s Flag: Using Entry Level Capture the Flag to Engage Low SES Student Groups",
    author = {Streiff, Joshua and Ringenberg, Tatiana, and Dev, Jayati, and Camp, L.Jean},
    howpublished = {ECGBL},
    month = {October},
    year = {2022},
    keywords = {IoT} }



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:23:45 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House