Jacob Hopkins (Texas A&M University - Corpus Christi), Carlos Rubio-Medrano (Texas A&M University - Corpus Christi), Cori Faklaris (University of North Carolina at Charlotte)

Data is a critical resource for technologies such as Large Language Models (LLMs) that are driving significant economic gains. Due to its importance, many different organizations are collecting and analyzing as much data as possible to secure their growth and relevance, leading to non-trivial privacy risks. Among the areas with potential for increased privacy risks are voluntary data-sharing events, when individuals willingly exchange their personal data for some service or item. This often places them in positions where they have inadequate control over what data should be exchanged and how it should be used. To address this power imbalance, we aim to obtain, analyze, and dissect the many different behaviors and needs of both parties involved in such negotiations, namely, the data subjects, i.e., the individuals whose data is being exchanged, and the data requesters, i.e., those who want to acquire the data. As an initial step, we are developing a multi-stage user study to better understand the factors that govern the behavior of both data subjects and requesters while interacting in data exchange negotiations. In addition, we aim to identify the design elements that both parties require so that future privacy-enhancing technologies (PETs) prioritizing privacy negotiation algorithms can be further developed and deployed in practice.

View More Papers

Phishing awareness and education – When to best remind?

Benjamin Maximilian Berens (SECUSO, Karlsruhe Institute of Technology), Katerina Dimitrova, Mattia Mossano (SECUSO, Karlsruhe Institute of Technology), Melanie Volkamer (SECUSO, Karlsruhe Institute of Technology)

Read More

GadgetMeter: Quantitatively and Accurately Gauging the Exploitability of Speculative...

Qi Ling (Purdue University), Yujun Liang (Tsinghua University), Yi Ren (Tsinghua University), Baris Kasikci (University of Washington and Google), Shuwen Deng (Tsinghua University)

Read More

Target-Centric Firmware Rehosting with Penguin

Andrew Fasano, Zachary Estrada, Luke Craig, Ben Levy, Jordan McLeod, Jacques Becker, Elysia Witham, Cole DiLorenzo, Caden Kline, Ali Bobi (MIT Lincoln Laboratory), Dinko Dermendzhiev (Georgia Institute of Technology), Tim Leek (MIT Lincoln Laboratory), William Robertson (Northeastern University)

Read More

A Multifaceted Study on the Use of TLS and...

Ka Fun Tang (The Chinese University of Hong Kong), Che Wei Tu (The Chinese University of Hong Kong), Sui Ling Angela Mak (The Chinese University of Hong Kong), Sze Yiu Chau (The Chinese University of Hong Kong)

Read More