Florian Schaub

Orcid: 0000-0003-1039-7155

Affiliations:
  • University of Michigan, School of Information, Ann Arbor, MI, USA


According to our database1, Florian Schaub authored at least 120 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cross-Contextual Examination of Older Adults' Privacy Concerns, Behaviors, and Vulnerabilities.
Proc. Priv. Enhancing Technol., January, 2024

Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences.
IEEE Secur. Priv., 2024

Automated Detection and Analysis of Data Practices Using A Real-World Corpus.
CoRR, 2024

2023
Awareness, Intention, (In)Action: Individuals' Reactions to Data Breaches.
ACM Trans. Comput. Hum. Interact., October, 2023

Researchers' Experiences in Analyzing Privacy Policies: Challenges and Opportunities.
Proc. Priv. Enhancing Technol., October, 2023

Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites.
Proc. Priv. Enhancing Technol., January, 2023

"Would I Feel More Secure With a Robot?": Understanding Perceptions of Security Robots in Public Spaces.
Proc. ACM Hum. Comput. Interact., 2023

"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Privacy Now or Never: Large-Scale Extraction and Analysis of Dates in Privacy Policy Text.
Proceedings of the ACM Symposium on Document Engineering 2023, 2023

Emotion AI at Work: Implications for Workplace Surveillance, Emotional Labor, and Emotional Privacy.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Less is Not More: Improving Findability and Actionability of Privacy Controls for Online Behavioral Advertising.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Increasing Adoption of Tor Browser Using Informational and Planning Nudges.
Proc. Priv. Enhancing Technol., 2022

Pervasive Surveillance and Privacy.
IEEE Pervasive Comput., 2022

Disparities in Students' Propensity to Consent to Learning Analytics.
Int. J. Artif. Intell. Educ., 2022

Aunties, Strangers, and the FBI: Online Privacy Concerns and Experiences of Muslim-American Women.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Novel Challenges of Safety, Security and Privacy in Extended Reality.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Trauma-Informed Computing: Towards Safer Technology Experiences for All.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Awareness, Adoption, and Misconceptions of Web Privacy Tools.
Proc. Priv. Enhancing Technol., 2021

Child Safety in the Smart Home: Parents' Perceptions, Needs, and Mitigation Strategies.
Proc. ACM Hum. Comput. Interact., 2021

The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence.
Proceedings of the 30th USENIX Security Symposium, 2021

"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online.
Proceedings of the 30th USENIX Security Symposium, 2021

"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them.
Proceedings of the 30th USENIX Security Symposium, 2021

"They See You're a Girl if You Pick a Pink Robot with a Skirt": A Qualitative Study of How Children Conceptualize Data Processing and Digital Privacy Risks.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Identifying Manipulative Advertising Techniques in XR Through Scenario Construction.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

The Annoying, the Disturbing, and the Weird: Challenges with Phone Numbers as Identifiers and Phone Number Recycling.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls.
Proc. Priv. Enhancing Technol., 2020

Privacy Impact Assessments for Digital Repositories.
Int. J. Digit. Curation, 2020

Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

From Intent to Action: Nudging Users Towards Secure Mobile Payments.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

"They Like to Hear My Voice": Exploring Usage Behavior in Speech-Based Mobile Instant Messaging.
Proceedings of the MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, 2020

Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

"It's a scavenger hunt": Usability of Websites' Opt-Out and Data Deletion Choices.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations.
ACM Trans. Web, 2019

We Value Your Privacy ... Now Take Some Cookies - Measuring the GDPR's Impact on Web Privacy.
Inform. Spektrum, 2019

Beyond Mandatory: Making Data Breach Notifications Useful for Consumers.
IEEE Secur. Priv., 2019

"We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Privacy and Security Threat Models and Mitigation Strategies of Older Adults.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

The Impact of Student Opt-Out on Educational Predictive Models.
Proceedings of the 9th International Conference on Learning Analytics & Knowledge, 2019

"It Only Tells Me How I Slept, Not How to Fix It": Exploring Sleep Behaviors and Opportunities for Sleep Technology.
Proceedings of the Information in Contemporary Society - 14th International Conference, 2019

You 'Might' Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

It's My Data! Tensions Among Stakeholders of a Learning Analytics Dashboard.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Put Your Warning Where Your Link Is: Improving and Evaluating Email Phishing Warnings.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

(Un)informed Consent: Studying GDPR Consent Notices in the Field.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Privacy in Mobile and Pervasive Computing
Synthesis Lectures on Mobile and Pervasive Computing, Morgan & Claypool Publishers, ISBN: 978-3-031-02486-3, 2018

Context-Adaptive Privacy Mechanisms.
Proceedings of the Handbook of Mobile Data Privacy., 2018

PrivOnto: A semantic framework for the analysis of privacy policies.
Semantic Web, 2018

Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers.
Proc. ACM Hum. Comput. Interact., 2018

Evolving Needs in IoT Control and Accountability: A Longitudinal Study on Smart Home Intelligibility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning.
Proceedings of the 27th USENIX Security Symposium, 2018

"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Concern But No Action: Consumers' Reactions to the Equifax Data Breach.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Keeping a Low Profile?: Technology, Risk and Privacy among Undocumented Immigrants.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A Transatlantic Initiative.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018

2017
Exploring End User Programming Needs in Home Automation.
ACM Trans. Comput. Hum. Interact., 2017

Designing Effective Privacy Notices and Controls.
IEEE Internet Comput., 2017

Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online.
ACM Comput. Surv., 2017

On the Use of Emojis in Mobile Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Automated Analysis of Privacy Requirements for Mobile Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Identifying the Provision of Choices in Privacy Policy Text.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017

The Impact of Assistive Technology on Communication Quality Between Deaf and Hearing Individuals.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

2016
Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition.
ACM Trans. Softw. Eng. Methodol., 2016

Crowdsourcing privacy policy analysis: Potential, challenges and best practices.
it Inf. Technol., 2016

Crowdsourcing Annotations for Websites' Privacy Policies: Can It Really Work?
Proceedings of the 25th International Conference on World Wide Web, 2016

Drone-based Privacy Interfaces: Opportunities and Challenges.
Proceedings of the Workshop on Security Fatigue, 2016

Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Implications of the Use of Emojis in Mobile Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

The Creation and Analysis of a Website Privacy Policy Corpus.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

Automatic Extraction of Opt-Out Choices from Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

Analyzing Vocabulary Intersections of Expert Annotations and Topic Models for Data Practices in Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

2015
Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making.
IEEE Pervasive Comput., 2015

What do they know about me? Contents and Concerns of Online Behavioral Profiles.
CoRR, 2015

Pseudonym Schemes in Vehicular Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2015

A Design Space for Effective Privacy Notices.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

The Impact of Timing on the Salience of Smartphone App Privacy Notices.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2014
Dynamic privacy adaptation in ubiquitous computing.
PhD thesis, 2014

Hover Pad: interacting with autonomous and self-actuated displays in space.
Proceedings of the 27th Annual ACM Symposium on User Interface Software and Technology, 2014

P.I.A.N.O.: Faster Piano Learning with Interactive Projection.
Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces, 2014

Scaling requirements extraction to the crowd: Experiments with privacy policies.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

PriPref broadcaster: enabling users to broadcast privacy preferences in their physical proximity.
Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014

Privacy implications of presence sharing in mobile messaging applications.
Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014

PriCal: context-adaptive privacy in ambient calendar displays.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Crowdsourcing the Extraction of Data Practices from Privacy Policies.
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014

Identifying Relevant Text Fragments to Help Crowdsource Privacy Policy Annotations.
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014

Broken display = broken interface': the impact of display damage on smartphone interaction.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

User Authentication for Rotary Knob Controlled In-car Applications.
Proceedings of the 6th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, Seattle, WA, USA, September 17, 2014

2013
On credibility improvements for automotive navigation systems.
Pers. Ubiquitous Comput., 2013

ProTACD: A Generic Privacy Process for Vehicle Development.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Exploring the design space of graphical passwords on smartphones.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Who, how, and why? Enhancing privacy awareness in Ubiquitous Computing.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Device Names in the Wild: Investigating Privacy Risks of Zero Configuration Networking.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

P.I.A.N.O.: enhancing instrument learning via interactive projected augmentation.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

homeBLOX: making home automation usable.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

PriCal: dynamic privacy adaptation of collaborative calendar displays.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

homeBLOX: introducing process-driven home automation.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Find my stuff: supporting physical objects search with relative positioning.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Prifi beacons: piggybacking privacy implications on wifi beacons.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

MIBA: multitouch image-based authentication on smartphones.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Efficiency analysis of geocast target region specifications for VANET applications.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Ginger: An Access Control Framework for Telematics Applications.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Towards context adaptive privacy decisions in ubiquitous computing.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Password entry usability and shoulder surfing susceptibility on different smartphone platforms.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, 2012

Find my stuff: a search engine for everyday objects.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, 2012

Privacy context model for dynamic privacy adaptation in ubiquitous computing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

2011
WiSec 2011 demo: PRECIOSA PeRA - practical enforcement of privacy policies in intelligent transportation systems.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Modeling in-network aggregation in VANETs.
IEEE Commun. Mag., 2011

PrivacyJudge: Effective Privacy Controls for Online Published Information.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

diretto: A Toolkit for Distributed Reporting and Collaboration.
Proceedings of the Mensch & Computer 2011: überMEDIEN|ÜBERmorgen, 2011

2010
V-Tokens for Conditional Pseudonymity in VANETs.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

On the potential of generic modeling for VANET data aggregation protocols.
Proceedings of the Second IEEE Vehicular Networking Conference, 2010

Interaction weaknesses of personal navigation devices.
Proceedings of 2nd International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2010

Towards Territorial Privacy in Smart Environments.
Proceedings of the Intelligent Information Privacy Management, 2010

Mandatory Enforcement of Privacy Policies using Trusted Computing Principles.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
A VANET-based emergency vehicle warning system.
Proceedings of the IEEE Vehicular Networking Conference, 2009

Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Privacy Requirements in Vehicular Communication Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009


  Loading...