Skip to main content

Showing 1–10 of 10 results for author: Coopamootoo, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.03680  [pdf, other

    cs.CY cs.CR cs.HC

    "Un-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns

    Authors: Kovila P. L. Coopamootoo, Magdalene Ng

    Abstract: There are indications in literature that women do not engage with security and privacy (SP) technologies, meant to keep them safe online, in the same way as men do. To better understand this gender gap, we conduct an online survey with N=604 U.K. participants, to elicit SP advice source preference and usage of SP methods and technologies. We find evidence of un-equal SP access and participation. I… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

    Comments: Pre-print for Usenix Security Symposium 2023

  2. arXiv:2204.10344  [pdf

    cs.CR cs.HC

    In Private, Secure, Conversational FinBots We Trust

    Authors: Magdalene Ng, Kovila P. L. Coopamootoo, Tasos Spiliotopoulos, Dave Horsfall, Mhairi Aitken, Ehsan Toreini, Karen Elliott, Aad van Moorsel

    Abstract: In the past decade, the financial industry has experienced a technology revolution. While we witness a rapid introduction of conversational bots for financial services, there is a lack of understanding of conversational user interfaces (CUI) features in this domain. The finance industry also deals with highly sensitive information and monetary transactions, presenting a challenge for developers an… ▽ More

    Submitted 21 April, 2022; originally announced April 2022.

    Comments: Proceedings of the CHI 2021 Workshop on Let's Talk About CUIs: Putting Conversational User Interface Design into Practice, May 8, 2021 in Yokohama, Japan

  3. arXiv:2202.04682  [pdf, other

    cs.HC cs.CR cs.CY

    "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country

    Authors: Kovila P. L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini

    Abstract: Online tracking is a primary concern for Internet users, yet previous research has not found a clear link between the cognitive understanding of tracking and protective actions. We postulate that protective behaviour follows affective evaluation of tracking. We conducted an online study, with N=614 participants, across the UK, Germany and France, to investigate how users feel about third-party tra… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

    Comments: https://www.usenix.org/system/files/sec22-coopamootoo.pdf

    Journal ref: USENIX Security Symposium 2022

  4. arXiv:2112.09767  [pdf

    cs.CY cs.CR cs.HC

    Know Your Customer: Balancing Innovation and Regulation for Financial Inclusion

    Authors: Karen Elliott, Kovila Coopamootoo, Edward Curran, Paul Ezhilchelvan, Samantha Finnigan, Dave Horsfall, Zhichao Ma, Magdalene Ng, Tasos Spiliotopoulos, Han Wu, Aad van Moorsel

    Abstract: Financial inclusion depends on providing adjusted services for citizens with disclosed vulnerabilities. At the same time, the financial industry needs to adhere to a strict regulatory framework, which is often in conflict with the desire for inclusive, adaptive, and privacy-preserving services. In this article we study how this tension impacts the deployment of privacy-sensitive technologies aimed… ▽ More

    Submitted 18 October, 2022; v1 submitted 17 December, 2021; originally announced December 2021.

    Comments: Published in the Journal Data & Policy

    Journal ref: Data & Policy (2022), 4: e34

  5. arXiv:2106.06053  [pdf

    cs.CY cs.CR cs.HC

    Identifying and Supporting Financially Vulnerable Consumers in a Privacy-Preserving Manner: A Use Case Using Decentralised Identifiers and Verifiable Credentials

    Authors: Tasos Spiliotopoulos, Dave Horsfall, Magdalene Ng, Kovila Coopamootoo, Aad van Moorsel, Karen Elliott

    Abstract: Vulnerable individuals have a limited ability to make reasonable financial decisions and choices and, thus, the level of care that is appropriate to be provided to them by financial institutions may be different from that required for other consumers. Therefore, identifying vulnerability is of central importance for the design and effective provision of financial services and products. However, va… ▽ More

    Submitted 10 June, 2021; originally announced June 2021.

    Comments: Published in the ACM CHI 2021 workshop on Designing for New Forms of Vulnerability

    ACM Class: H.5.3

  6. arXiv:2009.10278  [pdf, other

    cs.CY cs.CR cs.HC

    Usage Patterns of Privacy-Enhancing Technologies

    Authors: Kovila P. L. Coopamootoo

    Abstract: The steady reports of privacy invasions online paints a picture of the Internet growing into a more dangerous place. This is supported by reports of the potential scale for online harms facilitated by the mass deployment of online technology and the data-intensive web. While Internet users often express concern about privacy, some report taking actions to protect their privacy online. We investiga… ▽ More

    Submitted 21 September, 2020; originally announced September 2020.

    Comments: To be published in the Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20)

  7. arXiv:2007.08911  [pdf, other

    cs.LG cs.AI cs.CR cs.CY stat.ML

    Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context

    Authors: Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Vladimiro Gonzalez Zelaya, Paolo Missier, Magdalene Ng, Aad van Moorsel

    Abstract: Concerns about the societal impact of AI-based services and systems has encouraged governments and other organisations around the world to propose AI policy frameworks to address fairness, accountability, transparency and related topics. To achieve the objectives of these frameworks, the data and software engineers who build machine-learning systems require knowledge about a variety of relevant su… ▽ More

    Submitted 20 January, 2022; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: We are updating some sections to include more recent advances

  8. arXiv:2006.15449  [pdf, other

    cs.HC cs.CR

    Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance

    Authors: Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliot, Aad van Moorsel

    Abstract: FinBots are chatbots built on automated decision technology, aimed to facilitate accessible banking and to support customers in making financial decisions. Chatbots are increasing in prevalence, sometimes even equipped to mimic human social rules, expectations and norms, decreasing the necessity for human-to-human interaction. As banks and financial advisory platforms move towards creating bots th… ▽ More

    Submitted 3 July, 2020; v1 submitted 27 June, 2020; originally announced June 2020.

    Comments: In Publication for 5th IEEE European Symposium on Security & Privacy Workshops (EuroSPW)

  9. arXiv:2003.08990  [pdf, ps, other

    cs.CY cs.HC

    Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions & Method Preferences

    Authors: Kovila P. L. Coopamootoo

    Abstract: While it is often claimed that users are empowered via online technologies, there is also a general feeling of privacy dis-empowerment. We investigate the perception of privacy and sharing empowerment online, as well as the use of privacy technologies, via a cross-national online study with N=907 participants. We find that perception of privacy empowerment differs from that of sharing across dimen… ▽ More

    Submitted 19 March, 2020; originally announced March 2020.

    Comments: Kovila P.L. Coopamootoo, Dis-Empowerment Online - An Investigation of Privacy-Sharing Perceptions & Method Preferences: Proceedings of AsiaUSEC'20, Financial Cryptography and Data Security 2020 (FC). February 14, 2020 Kota Kinabalu, Sabah, Malaysia Springer, 2020

  10. arXiv:1912.00782  [pdf, other

    cs.CY cs.AI cs.LG

    The relationship between trust in AI and trustworthy machine learning technologies

    Authors: Ehsan Toreini, Mhairi Aitken, Kovila Coopamootoo, Karen Elliott, Carlos Gonzalez Zelaya, Aad van Moorsel

    Abstract: To build AI-based systems that users and the public can justifiably trust one needs to understand how machine learning technologies impact trust put in these services. To guide technology developments, this paper provides a systematic approach to relate social science concepts of trust with the technologies used in AI-based services and products. We conceive trust as discussed in the ABI (Ability,… ▽ More

    Submitted 3 December, 2019; v1 submitted 27 November, 2019; originally announced December 2019.

    Comments: This submission has been accepted in ACM FAT* 2020 Conference