Masooda Bashir
YOU?
Author Swipe
Can I Trust This Chatbot? Assessing User Privacy in <span>AI</span> ‐Healthcare Chatbot Applications Open
As Conversational Artificial Intelligence (AI) becomes more integrated into everyday life, AI‐powered chatbot mobile applications are becoming increasingly adopted across industries, particularly in healthcare domain. These chatbots offer …
Can I Trust This Chatbot? Assessing User Privacy in AI-Healthcare Chatbot Applications Open
As Conversational Artificial Intelligence (AI) becomes more integrated into everyday life, AI-powered chatbot mobile applications are increasingly adopted across industries, particularly in the healthcare domain. These chatbots offer acces…
An assessment of the enforcement mechanisms in African data protection laws Open
Africa has the second-biggest population in the world, with about 1,1 billion projected internet users by 2029. This growth in internet users has made many Africans vulnerable to privacy threats. To protect their citizens’ personal data, a…
View article: Taking disagreements into consideration: human annotation variability in privacy policy analysis
Taking disagreements into consideration: human annotation variability in privacy policy analysis Open
Introduction. Privacy policies inform users about data practices but are often complex and difficult to interpret. Human annotation plays a key role in understanding privacy policies, yet annotation disagreements highlight the complexity o…
View article: Unveiling Privacy and Security Gaps in Female Health Apps
Unveiling Privacy and Security Gaps in Female Health Apps Open
Female Health Applications (FHA), a growing segment of FemTech, aim to provide affordable and accessible healthcare solutions for women globally. These applications gather and monitor health and reproductive data from millions of users. Wi…
Decoding User Concerns in AI Health Chatbots: An Exploration of Security and Privacy in App Reviews Open
AI powered health chatbot applications are increasingly utilized for personalized healthcare services, yet they pose significant challenges related to user data security and privacy. This study evaluates the effectiveness of automated meth…
Threats and Security Strategies for IoMT Infusion Pumps Open
The integration of the Internet of Medical Things (IoMT) into healthcare systems has transformed patient care by enabling real-time monitoring, enhanced diagnostics, and enhanced operational efficiency. However, this increased connectivity…
What is in Your App? Uncovering Privacy Risks of Female Health Applications Open
FemTech or Female Technology, is an expanding field dedicated to providing affordable and accessible healthcare solutions for women, prominently through Female Health Applications that monitor health and reproductive data. With the leading…
An Exploratory Study of Malicious Link Posting on Social Media Applications Open
Social network platforms are now widely used as a mode of communication globally due to their popularity and their ease of use.Among the various content-sharing capabilities made available via these applications, link-sharing is a common a…
A Privacy Glossary for Cloud Computing Open
Cloud computing is an evolving paradigm that is frequently changing the way humans share, store, and access their information in digital format. While cloud computing offers tremendous benefits (e.g., efficiency, flexibility, and reduced c…
<span>COVID</span>‐19 Apps and Privacy Protections from Users' Perspective Open
As the spread of the novel coronavirus (COVID‐19) continues to be a global challenge, there have been numerous efforts and actions from both government and private organizations towards keeping their community members healthy and safe. One…
Extending Privacy Harms Toward a Non-Economic Perspective Open
Addressing data breach harms has become a great challenge in the administration of privacy law in the United States. Several data breach cases have been dismissed by US courts because the victims cannot prove cognizable harm. The current U…
Towards a Comprehensive Set of PII for Ensuring Privacy Protections Open
Personal Identifiable Information (PII) refers to any information that can be used to trace or identify an individual. With increasing online communication and a remote workforce, sharing PII has become mainstream online. In turn, this all…
Are PETs (Privacy Enhancing Technologies) Giving Protection for Smartphones? -- A Case Study Open
With smartphone technologies enhanced way of interacting with the world around us, it has also been paving the way for easier access to our private and personal information. This has been amplified by the existence of numerous embedded sen…
Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security Open
Despite widespread use of smartphones, there is no measurement standard targeted at smartphone security behaviors. In this paper we translate a well-known cybersecurity behavioral scale into the smartphone domain and show that we can impro…
View article: Eight months into the COVID-19 Pandemic- Do Users Expect less Privacy?
Eight months into the COVID-19 Pandemic- Do Users Expect less Privacy? Open
While mobile apps provide immense benefits for the containment of the spread of COVID-19, privacy and security of these digital tracing apps are at the center of public debate. To understand users concerns and preferences for using a COVID…
Preserving Privacy in Cyber-physical-social systems: An Anonymity and Access Control Approach Open
With the significant development of mobile commerce, the integration of physical, social, and cyber worlds is increasingly common.
\nThe term Cyber Physical Social Systems is used to capture technology’s human-centric role. With the revolu…
Personal Influences on Dynamic Trust Formation in Human-Agent Interaction Open
The development of automated technologies in our daily life has transformed the role of human operators from a controller to a teammate who shares control with automated agents. However, this 'teammate' relationship between humans and auto…
Users’ Adoption of Mental Health Apps: Examining the Impact of Information Cues Open
This study revealed a relationship between information cues and users' adoption of mental health apps by analyzing observational data. As the first of its kind, we found impactful indicators for mental health app adoptions. We also discove…
The onion router: Understanding a privacy enhancing technology community Open
Internet technologies have made mass surveillance prevalent and much easier to carry out, while at the same time making personal privacy more difficult to protect. The ubiquity of personal data processing has raised public awareness about …
"What Is Your Evidence?" A Study of Controversial Topics on Social Media Open
In recent years, social media has revolutionized how people communicate and share information.One function of social media, besides connecting with friends, is sharing opinions with others.Micro blogging sites, like Twitter, have often pro…