Computer Science
Attackers
16%
Community Action
8%
Computer Security
50%
Continuous Monitoring
50%
Digital Signature
50%
Fingerprint Verification
50%
Gathering Evidence
8%
Grained Control
50%
Household Member
33%
Individual Privacy
25%
Induced Problem
8%
Interactive Session
50%
Internet-Of-Things
41%
Malicious Actor
16%
Online Password
25%
Online Survey
50%
Privacy Control
100%
Privacy Threat
16%
Protecting Data
50%
Protective Action
50%
Qualitative Data
50%
Security and Privacy
16%
Security Mechanism
50%
Smart Device
50%
Smart Home Device
50%
Social Exclusion
50%
Supporting Evidence
50%
Survey Participant
7%
Systematic Methodology
25%
Technical Approach
25%
Technical Practice
50%
Two-Factor Authentication
50%
Voice Assistant
100%
Warning Design
50%
Web Browser Security
25%
Keyphrases
Adherence Rate
50%
Always Listening
50%
Architectural Approach
25%
Authentication Ceremonies
50%
Automatic Backup
12%
Behavioral Prompts
25%
Broad Adoption
25%
Commitment Device
50%
Contextual Integrity
50%
Continuous Analysis
25%
Continuous Recording
25%
Decision-making Styles
50%
Digital Safety
14%
Dissidents
12%
Encrypted Messaging
12%
Fine-grained Control
16%
Fingerprint Verification
50%
Household Characteristics
16%
Immediate Gratification
12%
Internet of Things Security
16%
Interpersonal Trust
16%
Keeper
50%
Listening Devices
50%
Malicious Actors
16%
Managerial Influence
8%
Mobile Phone Unlock
33%
Multinational Comparison
50%
Normal User
25%
Optimistic Access
50%
Organizational Influences
8%
Permission Requests
33%
Preapproval
16%
Prevalence Survey
16%
Privacy Boundaries
16%
Privacy Definition
50%
Proactive Operation
16%
Research Action
8%
Research Investment
7%
Risk of Harm
16%
Runtime Permission
50%
Security Mitigation
12%
Security Updates
12%
Security Warning
25%
Software Updating
8%
Task Framing
16%
Usable Privacy
50%
Visual Prompts
25%
Warning Design
50%
Web Browser Security
25%
Work Collaboration
16%