Apu Kapadia
Orcid: 0000-0003-4142-8444Affiliations:
- Indiana University Bloomington, IN, USA
According to our database1,
Apu Kapadia
authored at least 116 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Building Trust Through Voice: How Vocal Tone Impacts User Perception of Attractiveness of Voice Assistants.
CoRR, 2024
CoRR, 2024
Toward Effective Communication of AI-Based Decisions in Assistive Tools: Conveying Confidence and Doubt to People with Visual Impairments at Accelerated Speech.
Proceedings of the 21st International Web for All Conference, 2024
The Impact of Perceived Tone, Age, and Gender on Voice Assistant Persuasiveness in the Context of Product Recommendations.
Proceedings of the ACM Conversational User Interfaces 2024, 2024
Sharenting on TikTok: Exploring Parental Sharing Behaviors and the Discourse Around Children's Online Privacy.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Nat. Mac. Intell., July, 2023
Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social Media.
ACM Trans. Comput. Hum. Interact., 2023
Proc. ACM Hum. Comput. Interact., 2023
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
IEEE Secur. Priv., 2023
CoRR, 2023
Bottom-up psychosocial interventions for interdependent privacy: Effectiveness based on individual and content differences.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Shared Privacy Concerns of the Visually Impaired and Sighted Bystanders with Camera-Based Assistive Technologies.
ACM Trans. Access. Comput., 2022
Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms.
Proc. ACM Hum. Comput. Interact., 2022
"Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media.
Proc. ACM Hum. Comput. Interact., 2022
Sharenting and Children's Privacy in the United States: Parenting Style, Practices, and Perspectives on Sharing Young Children's Photos on Social Media.
Proc. ACM Hum. Comput. Interact., 2022
Tangible Privacy for Smart Voice Assistants: Bystanders' Perceptions of Physical Device Controls.
Proc. ACM Hum. Comput. Interact., 2022
Preventing sensitive-word recognition using self-supervised learning to preserve user-privacy for automatic speech recognition.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022
The Impact of Viral Posts on Visibility and Behavior of Professionals: A Longitudinal Study of Scientists on Twitter.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Does This Photo Make Me Look Good?: How Social Media Feedback on Photos Impacts Posters, Outsiders, and Friends.
Proc. ACM Hum. Comput. Interact., 2021
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication.
Proceedings of the 30th USENIX Security Symposium, 2021
What breach? Measuring online awareness of security incidents by studying real-world browsing behavior.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Your Photo is so Funny that I don't Mind Violating Your Privacy by Sharing it: Effects of Individual Humor Styles on Online Photo-sharing Behaviors.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 2021
2020
ACM Trans. Comput. Hum. Interact., 2020
"It's easier than causing confrontation": Sanctioning Strategies to Maintain Social Norms and Privacy on Social Media.
Proc. ACM Hum. Comput. Interact., 2020
Proc. ACM Hum. Comput. Interact., 2020
"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 42th Annual Meeting of the Cognitive Science Society, 2020
Privacy Considerations of the Visually Impaired with Camera Based Assistive Technologies: Misrepresentation, Impropriety, and Fairness.
Proceedings of the ASSETS '20: The 22nd International ACM SIGACCESS Conference on Computers and Accessibility, 2020
2019
Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Up to a Limit?: Privacy Concerns of Bystanders and Their Willingness to Share Additional Information with Visually Impaired Users of Assistive Technologies.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings.
Proc. Priv. Enhancing Technol., 2017
Challenges in Transitioning from Civil to Military Culture: Hyper-Selective Disclosure through ICTs.
Proc. ACM Hum. Comput. Interact., 2017
Understanding the Physical Safety, Security, and Privacy Concerns of People with Visual Impairments.
IEEE Internet Comput., 2017
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017
Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
Addressing Physical Safety, Security, and Privacy for People with Visual Impairments.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the Tenth International Conference on Web and Social Media, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Beyond the lock icon: real-time detection of phishing websites using public key certificates.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 IEEE International Symposium on Technology and Society, 2013
Proceedings of the Computer Supported Cooperative Work, 2013
2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice.
Proceedings of the Symposium On Usable Privacy and Security, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
DECENT: A decentralized architecture for enforcing privacy in online social networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the New Security Paradigms Workshop, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules.
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, 2012
Cachet: a decentralized architecture for privacy preserving social networking with caching.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
IEEE Trans. Dependable Secur. Comput., 2011
Pervasive Mob. Comput., 2011
CoRR, 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Eyeing your exposure: quantifying and controlling information sharing for improved privacy.
Proceedings of the Symposium On Usable Privacy and Security, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the Architecting Critical Systems, First International Symposium, 2010
MeD-Lights: a usable metaphor for patient controlled access to electronic health records.
Proceedings of the ACM International Health Informatics Symposium, 2010
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010
2008
TwoKind authentication: protecting private information in untrustworthy environments.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the Pervasive Computing, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 6th International Conference on Mobile Systems, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the Pervasive Computing, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2005
2004
IEEE Distributed Syst. Online, 2004
Routing with Confidence: Supporting Discretionary Routing Requirements in Policy Based Networks.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2002
Packet Spacing: An Enabling Mechanism for Delivering Multimedia Content in Computational Grids.
J. Supercomput., 2002
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
Proceedings of the Global Telecommunications Conference, 2002
2001
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001
2000
IRBAC 2000: Secure Interoperability Using Dynamic Role Translation.
Proceedings of the International Conference on Internet Computing, 2000