Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
Cookie disclaimers: Dark patterns and lack of transparency
- Benjamin Maximilian Berens,
- Mark Bohlender,
- Heike Dietmann,
- Chiara Krisam,
- Oksana Kulyk,
- Melanie Volkamer
Computers and Security (CSEC), Volume 136, Issue CJan 2024https://doi.org/10.1016/j.cose.2023.103507AbstractWhile cookie disclaimers on websites have been proposed to ensure that users make informed decisions regarding consenting to data collection via cookies, such informed consent is hindered by several factors. One of them is the presence of so-...
- research-articleNovember 2023
Machine-Learning-Based Spam Mail Detector
- Panem Charanarur,
- Harsh Jain,
- G. Srinivasa Rao,
- Debabrata Samanta,
- Sandeep Singh Sengar,
- Chaminda Thushara Hewage
AbstractThe proliferation of spam emails, a predominant form of online harassment, has elevated the significance of email in daily life. As a consequence, a substantial portion of individuals remain vulnerable to fraudulent activities. Despite Gmail’s “...
- ArticleJuly 2023
“Stay Out of My Way!”: The Impact of Cookie Consent Notice Design on Young Users’ Decision
HCI for Cybersecurity, Privacy and TrustJul 2023, pp 529–541https://doi.org/10.1007/978-3-031-35822-7_34AbstractWebsites use Cookies to store the information and preferences of users and may collect this information for different purposes such as session continuity, customized experience for users, and a data source for the advertisement strategies of third ...
- ArticleJune 2022
Factors that Influence Cookie Acceptance: Characteristics of Cookie Notices that Users Perceive to Affect Their Decisions
HCI in Business, Government and OrganizationsJun 2022, pp 272–285https://doi.org/10.1007/978-3-031-05544-7_21AbstractEspecially in e-commerce and associated online marketing, web cookies play an essential role as they provide information that is key, for instance, to improving website functionality and customization. With the 2019 ruling of the Court of Justice ...
- ArticleApril 2022
Securing Cookies/Sessions Through Non-fungible Tokens
Database Systems for Advanced Applications. DASFAA 2022 International WorkshopsApr 2022, pp 135–146https://doi.org/10.1007/978-3-031-11217-1_10AbstractCookies are used as authentication tokens after successfully validating users by web applications. As they are stored on the client’s side, it makes them vulnerable to hijacking, stealing, and unauthorized distribution. There are methods in the ...
-
- research-articleFebruary 2022
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling
Journal of Network and Computer Applications (JNCA), Volume 198, Issue CFeb 2022https://doi.org/10.1016/j.jnca.2021.103270AbstractProtecting web applications is becoming challenging every passing day, primarily because of attack sophistication, omnipresence of web applications and over-reliance on traditional Web Application Firewalls (WAFs). Advanced Persistent ...
- research-articleDecember 2021
Development of a web-resources testing system for compliance with GDPR regulation
ICEMIS'21: The 7th International Conference on Engineering & MIS 2021October 2021, Article No.: 76, pp 1–6https://doi.org/10.1145/3492547.3492661In this paper, we describe the development of a system for checking websites for compliance with the European standard on personal data processing - GDPR. The relevance of this problem is dictated by the entry into force of the General Data Protection ...
- ArticleJuly 2021
FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security
Detection of Intrusions and Malware, and Vulnerability AssessmentJul 2021, pp 237–257https://doi.org/10.1007/978-3-030-80825-9_12AbstractBrowser fingerprinting has established itself as a stateless technique to identify users on the Web. In particular, it is a highly criticized technique to track users. However, we believe that this identification technique can serve more virtuous ...
- research-articleJuly 2021
Cookie Banners and Privacy Policies: Measuring the Impact of the GDPR on the Web
ACM Transactions on the Web (TWEB), Volume 15, Issue 4Article No.: 20, pp 1–42https://doi.org/10.1145/3466722The General Data Protection Regulation (GDPR) is in effect since May of 2018. As one of the most comprehensive pieces of legislation concerning privacy, it sparked a lot of discussion on the effect it would have on users and providers of online services ...
- research-articleJune 2021
Differential Tracking Across Topical Webpages of Indian News Media
- Yash Vekaria,
- Vibhor Agarwal,
- Pushkal Agarwal,
- Sangeeta Mahapatra,
- Sakthi Balan Muthiah,
- Nishanth Sastry,
- Nicolas Kourtellis
WebSci '21: Proceedings of the 13th ACM Web Science Conference 2021June 2021, pp 299–308https://doi.org/10.1145/3447535.3462497Online user privacy and tracking have been extensively studied in recent years, especially due to privacy and personal data-related legislations in the EU and the USA, such as the General Data Protection Regulation, ePrivacy Regulation, and California ...
- ArticleJuly 2020
The Effects of Cookie Notices on Perceived Privacy and Trust in E-Commerce
HCI in Business, Government and OrganizationsJul 2020, pp 535–549https://doi.org/10.1007/978-3-030-50341-3_40AbstractWebsite cookies have become an indispensable part of today’s e-commerce due to the high benefits they provide to companies. However, to leverage their full potential, a multitude of legal framework conditions must be taken into account. A ...
- research-articleJanuary 2020
Cross-site scripting (XSS) attacks and mitigation: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 166, Issue CJan 2020https://doi.org/10.1016/j.comnet.2019.106960AbstractThe results of the Cisco 2018 Annual Security Report show that all analyzed web applications have at least one vulnerability. It also shows that web attacks are becoming more frequent, specific and sophisticated. According to this ...
- ArticleMarch 2019
Measuring Cookies and Web Privacy in a Post-GDPR World
AbstractIn response, the European Union has adopted the General Data Protection Regulation (GDPR), a legislative framework for data protection empowering individuals to control their data. Since its adoption on May 25th, 2018, its real-world implications ...
- articleDecember 2018
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
The Journal of Supercomputing (JSCO), Volume 74, Issue 12December 2018, pp 6428–6453https://doi.org/10.1007/s11227-017-2048-0The Internet of Things (IoT) is now a buzzword for Internet connectivity which extends to embedded devices, sensors and other objects connected to the Internet. Rapid development of this technology has led to the usage of various embedded devices in our ...
- research-articleDecember 2015
Secure authentication scheme for IoT and cloud servers
Pervasive and Mobile Computing (PAMC), Volume 24, Issue CDecember 2015, pp 210–223https://doi.org/10.1016/j.pmcj.2015.08.001Internet of Things (IoT) is an upcoming platform where information and communication technology connect multiple embedded devices to the Internet for performing information exchange. Owing to the immense development of this technology, embedded devices ...
- research-articleFebruary 2014
Automated cookie collection testing
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 23, Issue 1Article No.: 3, pp 1–40https://doi.org/10.1145/2559936Cookies are used by over 80% of Web applications utilizing dynamic Web application frameworks. Applications deploying cookies must be rigorously verified to ensure that the application is robust and secure. Given the intense time-to-market pressures ...
- ArticleNovember 2013
Measuring Surveillance in Online Advertising: A Big Data Approach
CTC '13: Proceedings of the 2013 Fourth Cybercrime and Trustworthy Computing WorkshopNovember 2013, pp 30–35https://doi.org/10.1109/CTC.2013.12There is an increasing public and policy awareness that tracking cookies are being used to support behavioral advertising, but the extent to which tracking is occurring is not clear. The extent of tracking could have implications for the enforceability ...
- ArticleJuly 2013
Preventing Abuse of Cookies Stolen by XSS
ASIAJCIS '13: Proceedings of the 2013 Eighth Asia Joint Conference on Information SecurityJuly 2013, pp 85–89https://doi.org/10.1109/ASIAJCIS.2013.20Cross Site Scripting (XSS) makes victims execute an arbitrary script and leaks out personal information from victims' computers. An adversary can easily get victim's cookies by the XSS attack. If the adversary cannot use the stolen cookies to ...
- articleSeptember 2012
Review: A survey on solutions and main free tools for privacy enhancing Web communications
Journal of Network and Computer Applications (JNCA), Volume 35, Issue 5September, 2012, pp 1473–1492https://doi.org/10.1016/j.jnca.2012.02.011Concern for privacy when users are surfing on the Web has increased recently. Nowadays, many users are aware that when they are accessing Web sites, these Web sites can track them and create profiles on the elements they access, the advertisements they ...
- articleMarch 2011
The “Panopticon” of search engines: the response of the European data protection framework
Requirements Engineering (REQE), Volume 16, Issue 1March 2011, pp 47–54https://doi.org/10.1007/s00766-010-0107-7Nowadays, Internet users are depending on various search engines in order to be able to find requested information on the Web. Although most users feel that they are and remain anonymous when they place their search queries, reality proves otherwise. ...