Comparing Large-Scale Privacy and Security Notifications

نویسندگان

چکیده

Over the last decade, web security research has used notification campaigns as a tool to help operators fix problems or stop infrastructure abuse. First attempts at applying this approach privacy issues focused on single services vendors. Hence, little is known if notifications can also raise awareness and encourage remediation of more complex, vendor-independent violations legislation scale, such informed consent cookie usage under EU's ePrivacy Directive General Data Protection Regulation's requirement for policy. It unclear how perform are perceived compared those about vulnerabilities. To fill gap, we conduct large-scale, automated email study with than 115K websites notify lack policy, use third-party cookies without before consent, input forms personal data that do not HTTPS. We investigate impact warnings fines compare results 40K domains openly accessible Git repositories. Based our measurements interactions through survey, find well received notifications. They result in lower rates, less incentive take immediate action, negative feedback. Specific reasons include knowledge laws' applicability, difficulties pinpoint problem, limited intrinsic motivation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preserving Security and Privacy in Large-Scale VANETs

Upcoming vehicular ad hoc networks (VANETs) allowing vehicles to talk to each other are expected to enhance safety and efficiency in transportation systems. This type of networks is especially attractive in highly populated urban areas overwhelmed with traffic congestions and accidents. Besides vulnerabilities versus attacks against traffic safety and driver privacy, a large-scale VANET in a me...

متن کامل

Large-scale Incremental Processing Using Distributed Transactions and Notifications

Updating an index of the web as documents are crawled requires continuously transforming a large repository of existing documents as new documents arrive. This task is one example of a class of data processing tasks that transform a large repository of data via small, independent mutations. These tasks lie in a gap between the capabilities of existing infrastructure. Databases do not meet the s...

متن کامل

Security and Privacy Challenges in Large-Scale Cloud Computing using Signature Generation Algorithm

In this paper, the secure data storage in clouds for a new decentralized access is proposed. Concerns like data leakage are common and can influence the original data owners drastically. Encrypting every data over the cloud which is a huge collection of data is not economically feasible. Signature Generation Algorithm (SGA) is proposed to authenticate the data access from the cloud to ensure th...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2023

ISSN: ['2299-0984']

DOI: https://doi.org/10.56553/popets-2023-0076