From post

Japanese Users' (Mis)understandings of Technical Terms Used in Privacy Policies and the Privacy Protection Law.

, , , и . HCI (45), том 14728 из Lecture Notes in Computer Science, стр. 245-264. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods., , , и . EuroUSEC, стр. 36-47. ACM, (2021)Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails., , , и . SOUPS @ USENIX Security Symposium, стр. 319-338. USENIX Association, (2021)Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services., , , , и . J. Inf. Process., (2020)Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A Site., , , , и . SOUPS @ USENIX Security Symposium, стр. 39-56. USENIX Association, (2022)How WEIRD is Usable Privacy and Security Research?, , и . USENIX Security Symposium, USENIX Association, (2024)Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails., , , и . J. Inf. Process., (2022)DomainScouter: Understanding the Risks of Deceptive IDNs., , , , , и . RAID, стр. 413-426. USENIX Association, (2019)Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries., , , и . CHI, стр. 187:1-187:17. ACM, (2023)Analysis of Non-Experts' Security- and Privacy-Related Questions on a Q&A Site., , , , и . IEICE Trans. Inf. Syst., 106 (9): 1380-1396 (сентября 2023)A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects., , , и . ACSAC, стр. 349-364. ACM, (2021)