{"id":1271,"date":"2024-12-24T10:26:15","date_gmt":"2024-12-24T15:26:15","guid":{"rendered":"https:\/\/www.golive.clarku.edu\/faculty\/profiles\/peter-story\/"},"modified":"2026-04-05T21:37:10","modified_gmt":"2026-04-06T01:37:10","slug":"peter-story","status":"publish","type":"cu_faculty","link":"https:\/\/www.clarku.edu\/faculty\/profiles\/peter-story\/","title":{"rendered":"Peter Story"},"content":{"rendered":"<p>Dr. Peter Story researches usable security and privacy. As digital technologies become ever more intertwined with our lives, security and privacy have never been more important. People can protect themselves from digital threats by using protective technologies, such as secure mobile payment systems like Apple Pay and privacy tools like Tor Browser. However, protective technologies will not be widely adopted if they are misunderstood or difficult to use. Peter&#8217;s research involves studying the strengths and weaknesses of protective tools, studying people&#8217;s perceptions of these tools, and developing new protective technologies. Peter holds a PhD in Societal Computing from Carnegie Mellon University, and a Bachelor of Science in Computer Science from Gordon College.<\/p>\n","protected":false},"author":0,"featured_media":1976,"parent":0,"template":"","meta":{"cu_faculty_f180_userid":"C70291307","cu_faculty_first_name":"Peter","cu_faculty_last_name":"Story","cu_faculty_employment_status":"Full Time","cu_faculty_rank":"Visiting Assistant Professor","cu_faculty_position":"Assistant Professor","cu_faculty_phone":"","cu_faculty_email":"PeStory@clarku.edu","cu_faculty_location":"","cu_faculty_about":"<p>Dr. Peter Story researches usable security and privacy. As digital technologies become ever more intertwined with our lives, security and privacy have never been more important. People can protect themselves from digital threats by using protective technologies, such as secure mobile payment systems like Apple Pay and privacy tools like Tor Browser. However, protective technologies will not be widely adopted if they are misunderstood or difficult to use. Peter's research involves studying the strengths and weaknesses of protective tools, studying people's perceptions of these tools, and developing new protective technologies. Peter holds a PhD in Societal Computing from Carnegie Mellon University, and a Bachelor of Science in Computer Science from Gordon College.<\/p>","cu_faculty_degrees":"<span>Ph.D. in ,<\/span> Carnegie Mellon University, 2021\n<span>B.S. in ,<\/span> Gordon College, 2015","cu_faculty_cv":"https:\/\/faculty180.interfolio.com\/public\/download.php?key=SDRwNCtxSUpsamxBQ213WS9ucHFuNnMwT0hzQU11b2RPQkJ2cWc3amxyUmNRdVVXTkF4MU1zT21qREtJZEdWZ2UxUUhrRWNxSGJUVXUxaU83aGxvSzBHMjBjdnUyb0RBS2lHL2dNSy9VN1E9","cu_faculty_links":"{\"Professional Website URL\":\"https:\\\/\\\/peterstory.me\"}","cu_faculty_scholarly_interests":"security, privacy, usability, nudging","cu_faculty_scholarly_works":"[{\"activityid\":13018,\"fields\":{\"Type\":\"Other Teaching Materials (re: AACSB)\",\"Title\":\"Technology and Digital Well-Being\",\"Year\":2025,\"Organization\":\"ACM EngageCSEdu\",\"Description\":\"\",\"Include description in output citation\":0,\"URL\":\"https:\\\/\\\/dl.acm.org\\\/doi\\\/book\\\/10.1145\\\/3724134\",\"Origin\":\"Manual\"},\"facultyid\":\"C70291307\",\"status\":[{\"id\":13018,\"status\":\"Completed\\\/Published\",\"term\":\"Spring\",\"year\":2025,\"termid\":\"2024\\\/03\",\"listingorder\":6,\"completionorder\":6}],\"userid\":\"C70291307\",\"attachments\":[{\"attachmentid\":11456,\"mimetype\":\"custom\\\/url\",\"filename\":\"https:\\\/\\\/dl.acm.org\\\/doi\\\/book\\\/10.1145\\\/3724134\",\"filesize\":95494,\"downloadurl\":\"https:\\\/\\\/faculty180.interfolio.com\\\/public\\\/download.php?key=SDRwNCtxSUpsamxBQ213WS9ucHFuNnMwT0hzQU11b2RPQkJ2cWc3amxyUmNRdVVXTkF4MU1zT21qREtJZEdWZ1RsSm9mZnVZZG1KWFlJYzNhaU9UMGNLejRNZU5SSzV2RzlyemxlMk01b25DamkxYWFGZHYwNUZmUDR5S0h1ODFWRWM5U3F6OEFrVStXUlErMklYVit4L2VOU2RiU1BNNGZMRk4rWGplVzJvPQ%3D%3D\"}],\"coauthors_list\":[\"Peter G Story\"],\"sort_date\":\"2025-1-01\"},{\"activityid\":10269,\"fields\":{\"Type\":\"Papers Published - Conference Proceedings\",\"Title of Paper\":\"The Impact of Risk Appeal Approaches on Users\\u2019 Sharing Confidential Information\",\"Title of Published Proceedings\":\"Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems (CHI 2024)\",\"Title of Conference\":\"Conference on Human Factors in Computing Systems\",\"Conference Location\":\"Honolulu, Hawaii\",\"Month \\\/ Season\":\"May\",\"Year\":2024,\"Publisher\":\"\",\"Publisher City and State\":\"\",\"Volume\":\"\",\"Issue Number \\\/ Edition\":\"\",\"Page Numbers\":\"\",\"DOI\":\"\",\"CoAuthor\":null,\"URL\":\"\",\"Description\":\"\",\"Include description in output citation\":0,\"Origin\":\"Manual\"},\"facultyid\":\"C70291307\",\"status\":[{\"id\":10269,\"status\":\"Completed\\\/Published\",\"term\":\"Summer\",\"year\":2024,\"termid\":\"2023\\\/05\",\"listingorder\":6,\"completionorder\":6},{\"id\":10269,\"status\":\"Accepted\",\"term\":\"Fall\",\"year\":2023,\"termid\":\"2023\\\/01\",\"listingorder\":4,\"completionorder\":4},{\"id\":10269,\"status\":\"Submitted\",\"term\":\"Summer\",\"year\":2023,\"termid\":\"2022\\\/05\",\"listingorder\":2,\"completionorder\":2}],\"userid\":\"C70291307\",\"attachments\":[{\"attachmentid\":8636,\"mimetype\":\"application\\\/pdf\",\"filename\":\"CHI_24.pdf\",\"filesize\":6032595,\"downloadurl\":\"https:\\\/\\\/faculty180.interfolio.com\\\/public\\\/download.php?key=SDRwNCtxSUpsamxBQ213WS9ucHFuNnMwT0hzQU11b2RPQkJ2cWc3amxyUmNRdVVXTkF4MU1zT21qREtJZEdWZ204UVVpYWhnaTVNd2RPVzBEL0ppSDlDMHA2NVZaRE1FSTJNYy9MWG80cTg9\"}],\"coauthors_list\":[\"Elham Al Qahtani\",\"Peter G Story\",\"Mohamed Shehab\"],\"sort_date\":\"2024-5-01\"},{\"activityid\":10270,\"fields\":{\"Type\":\"Papers Published - Conference Proceedings\",\"Title of Paper\":\"Measuring the Prevalence of Password Manager Issues Using In-Situ Experiments\",\"Title of Published Proceedings\":\"Symposium on Usable Security and Privacy (USEC 2024)\",\"Title of Conference\":\"\",\"Conference Location\":\"San Diego, CA\",\"Month \\\/ Season\":\"February\",\"Year\":2024,\"Publisher\":\"\",\"Publisher City and State\":\"\",\"Volume\":\"\",\"Issue Number \\\/ Edition\":\"\",\"Page Numbers\":\"\",\"DOI\":\"\",\"CoAuthor\":null,\"URL\":\"\",\"Description\":\"\",\"Include description in output citation\":0,\"Origin\":\"Manual\"},\"facultyid\":\"C70291307\",\"status\":[{\"id\":10270,\"status\":\"Completed\\\/Published\",\"term\":\"Spring\",\"year\":2024,\"termid\":\"2023\\\/03\",\"listingorder\":6,\"completionorder\":6},{\"id\":10270,\"status\":\"Submitted\",\"term\":\"Fall\",\"year\":2023,\"termid\":\"2023\\\/01\",\"listingorder\":2,\"completionorder\":2}],\"userid\":\"C70291307\",\"attachments\":[{\"attachmentid\":8637,\"mimetype\":\"custom\\\/url\",\"filename\":\"https:\\\/\\\/www.ndss-symposium.org\\\/wp-content\\\/uploads\\\/usec2024-94-paper.pdf\",\"filesize\":95494,\"downloadurl\":\"https:\\\/\\\/faculty180.interfolio.com\\\/public\\\/download.php?key=SDRwNCtxSUpsamxBQ213WS9ucHFuNnMwT0hzQU11b2RPQkJ2cWc3amxyUmNRdVVXTkF4MU1zT21qREtJZEdWZ1RsSm9mZnVZZG1KWFlJYzNhaU9UMGNLejRNZU5SSzV2Y3g4YmVVWjRybGRYdkZxaitoL1p6ZGZzaXZpbURBdjlRbTIyVUFMWURZYyt4SU05YWt2ZXlHeXFwM3VNLytSZDBJYVpwandtM1RNS2Fwb29SRk5nQkZ5Szd2STgwVDh0b0lhMlhwVENLL0k9\"}],\"coauthors_list\":[\"Adryana Hutchinson\",\"Jinwei Tang\",\"Adam J Aviv\",\"Peter G Story\"],\"sort_date\":\"2024-2-01\"},{\"activityid\":10271,\"fields\":{\"Type\":\"Other Media (social media, blogs, podcasts, etc)\",\"Title\":\"The Bright and Dark Patterns of Design\",\"Episode Title\":\"\",\"Date Published\":\"2024-03-29\",\"Year\":2024,\"Platform\":\"Challenge. Change. Podcast\",\"CoAuthor\":null,\"URL\":\"https:\\\/\\\/clarknow.clarku.edu\\\/captivate-podcast\\\/the-bright-and-dark-pattern-of-design-with-pete-story-and-kat-andler\\\/\",\"Description\":\"\",\"Include description in output citation\":0,\"Origin\":\"Manual\"},\"facultyid\":\"C70291307\",\"status\":[{\"id\":10271,\"status\":\"Completed\\\/Published\",\"term\":\"Spring\",\"year\":2024,\"termid\":\"2023\\\/03\",\"listingorder\":6,\"completionorder\":6}],\"userid\":\"C70291307\",\"attachments\":[{\"attachmentid\":8641,\"mimetype\":\"custom\\\/url\",\"filename\":\"https:\\\/\\\/clarknow.clarku.edu\\\/captivate-podcast\\\/the-bright-and-dark-pattern-of-design-with-pete-story-and-kat-andler\\\/\",\"filesize\":95494,\"downloadurl\":\"https:\\\/\\\/faculty180.interfolio.com\\\/public\\\/download.php?key=SDRwNCtxSUpsamxBQ213WS9ucHFuNnMwT0hzQU11b2RPQkJ2cWc3amxyUmNRdVVXTkF4MU1zT21qREtJZEdWZ1RsSm9mZnVZZG1KWFlJYzNhaU9UMGNLejRNZU5SSzV2TVJ6RktXcldJR1hLSzNYaGozZFhseUFKaVZ2aHZ5YWx3L3hyamx4eTNscTBnOXZqaXlLZHdsREltazlhZzVVeDl5MDhvaDMyYm0rSTF1WmNYSXJhYjJtMWxpSlNCeVZQeEVHeVl0MkFtVjNZSU54M3YxUThRNmsxQTNUTE4rcC9PdFFBRVRoOVhVWmR3eUVWL3ErSm5xMjdpaHlYOHdxSw%3D%3D\"}],\"coauthors_list\":[\"Peter G Story\",\"Kat B Andler\",\"Andrew Hart\",\"Melissa Hanson\"],\"sort_date\":\"2024-03-29\"},{\"activityid\":9142,\"fields\":{\"Type\":\"Papers Published - Conference Proceedings\",\"Title of Paper\":\"Building an Affordable Data Diode to Protect Journalists\",\"Title of Published Proceedings\":\"Workshop on Privacy Engineering in Practice (PEP '23)\",\"Title of Conference\":\"USENIX Symposium on Usable Privacy and Security (SOUPS) 2023\",\"Conference Location\":\"Anaheim, California\",\"Month \\\/ Season\":\"August\",\"Year\":2023,\"Publisher\":\"\",\"Publisher City and State\":\"\",\"Volume\":\"\",\"Issue Number \\\/ Edition\":\"\",\"Page Numbers\":\"\",\"DOI\":\"\",\"CoAuthor\":null,\"URL\":\"https:\\\/\\\/pep23.com\\\/assets\\\/pdf\\\/pep23-paper7.pdf\",\"Description\":\"\",\"Include description in output citation\":0,\"Origin\":\"Manual\"},\"facultyid\":\"C70291307\",\"status\":[{\"id\":9142,\"status\":\"Completed\\\/Published\",\"term\":\"Summer\",\"year\":2023,\"termid\":\"2022\\\/05\",\"listingorder\":6,\"completionorder\":6}],\"userid\":\"C70291307\",\"attachments\":[{\"attachmentid\":7460,\"mimetype\":\"custom\\\/url\",\"filename\":\"https:\\\/\\\/pep23.com\\\/assets\\\/pdf\\\/pep23-paper7.pdf\",\"filesize\":95494,\"downloadurl\":\"https:\\\/\\\/faculty180.interfolio.com\\\/public\\\/download.php?key=SDRwNCtxSUpsamxBQ213WS9ucHFuNnMwT0hzQU11b2RPQkJ2cWc3amxyUmNRdVVXTkF4MU1zT21qREtJZEdWZ1RsSm9mZnVZZG1KWFlJYzNhaU9UMGNLejRNZU5SSzV2MW85VHIxV3g0YmFDcjhZOGlvOHdWNFJrK0g5Skd4NWRKK1o3UVBWWFRlMHFhcWZnSVBMQ0lMY0lDblRLRnhzY2ZMRk4rWGplVzJvPQ%3D%3D\"}],\"coauthors_list\":[\"Peter G Story\"],\"sort_date\":\"2023-8-01\"},{\"activityid\":7442,\"fields\":{\"Type\":\"Other Teaching Materials (re: AACSB)\",\"Title\":\"Web Accessibility Evaluations\",\"Year\":2023,\"Organization\":\"ACM EngageCSEdu\",\"Description\":\"This lab helps students gain experience and proficiency with alternative modalities for browsing the web (i.e., navigation using the keyboard and using screen readers). Students will learn how to perform a website accessibility evaluation using a keyboard and screen reader. Students will also gain an appreciation for the prevalence of web accessibility issues, and will reflect on what can be done to improve web accessibility.&lt;br&gt;&lt;br&gt;&quot;EngageCSEdu (http:\\\/\\\/www.engage-csedu.org) publishes high-quality, engaging, classroom-tested Open Educational Resources (OER\\u2019s) for computer science education with a focus on materials for introductory courses in computing.&quot;\",\"Include description in output citation\":0,\"URL\":\"https:\\\/\\\/dl.acm.org\\\/doi\\\/book\\\/10.1145\\\/3597501\",\"Origin\":\"Manual\"},\"facultyid\":\"C70291307\",\"status\":[{\"id\":7442,\"status\":\"Accepted\",\"term\":\"Summer\",\"year\":2024,\"termid\":\"2023\\\/05\",\"listingorder\":4,\"completionorder\":4},{\"id\":7442,\"status\":\"Completed\\\/Published\",\"term\":\"Summer\",\"year\":2023,\"termid\":\"2022\\\/05\",\"listingorder\":6,\"completionorder\":6},{\"id\":7442,\"status\":\"Revise &amp; Resubmit\",\"term\":\"Spring\",\"year\":2023,\"termid\":\"2022\\\/03\",\"listingorder\":3,\"completionorder\":3}],\"userid\":\"C70291307\",\"attachments\":[{\"attachmentid\":11457,\"mimetype\":\"custom\\\/url\",\"filename\":\"https:\\\/\\\/dl.acm.org\\\/doi\\\/book\\\/10.1145\\\/3597501\",\"filesize\":95494,\"downloadurl\":\"https:\\\/\\\/faculty180.interfolio.com\\\/public\\\/download.php?key=SDRwNCtxSUpsamxBQ213WS9ucHFuNnMwT0hzQU11b2RPQkJ2cWc3amxyUmNRdVVXTkF4MU1zT21qREtJZEdWZ1RsSm9mZnVZZG1KWFlJYzNhaU9UMGNLejRNZU5SSzV2RzlyemxlMk01b25DamkxYWFGZHYwNUZmUDR5S0h1ODFWRWM5U3F6OEFrVStXUlErMklYVis4V0F3Slhxem4yNWZMRk4rWGplVzJvPQ%3D%3D\"}],\"coauthors_list\":[\"Peter G Story\"],\"sort_date\":\"2023-1-01\"},{\"activityid\":7195,\"fields\":{\"Type\":\"Papers Published - Conference Proceedings\",\"Title of Paper\":\"A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy Policy Corpus\",\"Title of Published Proceedings\":\"Proceedings of the Thirteenth Language Resources and Evaluation Conference\",\"Title of Conference\":\"\",\"Conference Location\":\"\",\"Month \\\/ Season\":\"jun\",\"Year\":2022,\"Publisher\":\"European Language Resources Association\",\"Publisher City and State\":\"\",\"Volume\":\"\",\"Issue Number \\\/ Edition\":\"\",\"Page Numbers\":\"\",\"DOI\":\"\",\"CoAuthor\":null,\"URL\":\"\",\"Description\":\"\",\"Include description in output citation\":0,\"Origin\":\"BibTeX\"},\"facultyid\":\"C70291307\",\"status\":[{\"id\":7195,\"status\":\"Completed\\\/Published\",\"term\":\"Summer\",\"year\":2022,\"termid\":\"2021\\\/05\",\"listingorder\":6,\"completionorder\":6}],\"userid\":\"C70291307\",\"attachments\":[{\"attachmentid\":5776,\"mimetype\":\"custom\\\/url\",\"filename\":\"https:\\\/\\\/aclanthology.org\\\/2022.lrec-1.585.pdf\",\"filesize\":95494,\"downloadurl\":\"https:\\\/\\\/faculty180.interfolio.com\\\/public\\\/download.php?key=SDRwNCtxSUpsamxBQ213WS9ucHFuNnMwT0hzQU11b2RPQkJ2cWc3amxyUmNRdVVXTkF4MU1zT21qREtJZEdWZ1RsSm9mZnVZZG1KWFlJYzNhaU9UMGNLejRNZU5SSzV2MjBUa0RmbTMzUU5hUHZ3eGV0ME5jMXV5aVJ3RG9WaFlpSTZNQmcvVnhOWVZSSy9keVp1ckZhNkZnRW1aaU15Lw%3D%3D\"}],\"coauthors_list\":[\"Siddhant Arora\",\"Henry Hosseini\",\"Christine Utz\",\"Kumar, Vinayshekhar Bannihatti\",\"Tristan Dhellemmes\",\"Abhilasha Ravichander\",\"Peter Story\",\"Jasmine Mangat\",\"Rex Chen\",\"Martin Degeling\",\"Thomas Norton\",\"Thomas Hupperich\",\"Shomir Wilson\",\"Norman Sadeh\"],\"sort_date\":\"2022-6-01\"},{\"activityid\":5348,\"fields\":{\"Type\":\"Articles in Refereed Journals\",\"Title\":\"Increasing Adoption of Tor Browser Using Informational and Planning Nudges\",\"Journal Title\":\"Proceedings on Privacy Enhancing Technologies\",\"Series Title\":\"\",\"Month \\\/ Season\":\"\",\"Year\":2022,\"Publisher\":\"\",\"Publisher City and State\":\"\",\"Publisher Country\":\"\",\"Volume\":\"2\",\"Issue Number \\\/ Edition\":\"\",\"Page Number(s) or Number of Pages\":\"152--183\",\"ISSN\":\"\",\"DOI\":\"\",\"CoAuthor\":null,\"URL\":\"\",\"Description\":\"\",\"Include description in output citation\":0,\"Origin\":\"BibTeX\"},\"facultyid\":\"C70291307\",\"status\":[{\"id\":5348,\"status\":\"Accepted\",\"term\":\"Summer\",\"year\":2022,\"termid\":\"2021\\\/05\",\"listingorder\":4,\"completionorder\":4},{\"id\":5348,\"status\":\"Completed\\\/Published\",\"term\":\"Summer\",\"year\":2022,\"termid\":\"2021\\\/05\",\"listingorder\":6,\"completionorder\":6}],\"userid\":\"C70291307\",\"attachments\":[{\"attachmentid\":4132,\"mimetype\":\"custom\\\/url\",\"filename\":\"https:\\\/\\\/peterstory.me\\\/publications\\\/story_popets_2022.pdf\",\"filesize\":95494,\"downloadurl\":\"https:\\\/\\\/faculty180.interfolio.com\\\/public\\\/download.php?key=SDRwNCtxSUpsamxBQ213WS9ucHFuNnMwT0hzQU11b2RPQkJ2cWc3amxyUmNRdVVXTkF4MU1zT21qREtJZEdWZ1RsSm9mZnVZZG1KWFlJYzNhaU9UMGNLejRNZU5SSzV2SDdtSDV1MDBRRUk0VlZML3FMVmlQVjN2ZkkzekdMc0UrWkZZaStqeEE0WWYxd3Q4T29mYkRDOU5ML1BMRmY2U0RIcmlaN3VQRytrall4ejh0ZWppcnc9PQ%3D%3D\"}],\"coauthors_list\":[\"Peter Story\",\"Daniel Smullen\",\"Rex Chen\",\"Yaxing Yao\",\"Alessandro Acquisti\",\"Lorrie Faith Cranor\",\"Norman Sadeh\",\"Florian Schaub\"],\"sort_date\":\"2022-1-01\"},{\"activityid\":5347,\"fields\":{\"Type\":\"Articles in Refereed Journals\",\"Title\":\"Awareness, adoption, and misconceptions of web privacy tools\",\"Journal Title\":\"Proceedings on Privacy Enhancing Technologies\",\"Series Title\":\"\",\"Month \\\/ Season\":\"\",\"Year\":2021,\"Publisher\":\"\",\"Publisher City and State\":\"\",\"Publisher Country\":\"\",\"Volume\":\"2021\",\"Issue Number \\\/ Edition\":\"3\",\"Page Number(s) or Number of Pages\":\"308--333\",\"ISSN\":\"\",\"DOI\":\"\",\"CoAuthor\":null,\"URL\":\"\",\"Description\":\"\",\"Include description in output citation\":0,\"Origin\":\"BibTeX\"},\"facultyid\":\"C70291307\",\"status\":[{\"id\":5347,\"status\":\"Completed\\\/Published\",\"term\":\"Summer\",\"year\":2021,\"termid\":\"2020\\\/05\",\"listingorder\":6,\"completionorder\":6}],\"userid\":\"C70291307\",\"attachments\":[{\"attachmentid\":3840,\"mimetype\":\"custom\\\/url\",\"filename\":\"https:\\\/\\\/usableprivacy.org\\\/static\\\/files\\\/story_popets_2021.pdf\",\"filesize\":95494,\"downloadurl\":\"https:\\\/\\\/faculty180.interfolio.com\\\/public\\\/download.php?key=SDRwNCtxSUpsamxBQ213WS9ucHFuNnMwT0hzQU11b2RPQkJ2cWc3amxyUmNRdVVXTkF4MU1zT21qREtJZEdWZ1RsSm9mZnVZZG1KWFlJYzNhaU9UMGNLejRNZU5SSzV2bHlPQXI3VnVycUM5UFBtUFNhbUlPTEZHN1hUYktYclJIeFJXdjNsd2dUSW9TOHFsc3VxSDZ1ZVZZNHNLeFBZMlZLaXU4VFRKYkgxaXhZYTROM2Z5eWFJRXVKTFlzOVZV\"}],\"coauthors_list\":[\"Peter Story\",\"Daniel Smullen\",\"Yaxing Yao\",\"Alessandro Acquisti\",\"Lorrie Faith Cranor\",\"Norman Sadeh\",\"Florian Schaub\"],\"sort_date\":\"2021-1-01\"},{\"activityid\":5356,\"fields\":{\"Type\":\"Other Scholarly or Creative Work\",\"Title\":\"Design and Evaluation of Security and Privacy Nudges: From Protection Motivation Theory to Implementation Intentions\",\"Journal Title \\\/ Book Title \\\/ Volume Title\":\"Doctoral dissertation\",\"Series Title\":\"\",\"Month\":\"August\",\"Year\":2021,\"Publisher\":\"\",\"Journal \\\/ Publisher City and State\":\"Carnegie Mellon University\",\"Jounal \\\/ Publisher Country\":\"\",\"Volume\":\"\",\"Issue Number \\\/ Edition\":\"\",\"Page Number(s) or Number of Pages\":\"196\",\"ISBN \\\/ ISSN \\\/ Case Number\":\"\",\"Co-contributor\":null,\"URL\":\"https:\\\/\\\/peterstory.me\\\/publications\\\/StoryThesisDefense.pdf\",\"Description\":\"\",\"Include description in output citation\":0,\"Origin\":\"Manual\"},\"facultyid\":\"C70291307\",\"status\":[{\"id\":5356,\"status\":\"Completed\\\/Published\",\"term\":\"Summer\",\"year\":2021,\"termid\":\"2020\\\/05\",\"listingorder\":6,\"completionorder\":6}],\"userid\":\"C70291307\",\"attachments\":[{\"attachmentid\":3839,\"mimetype\":\"custom\\\/url\",\"filename\":\"https:\\\/\\\/peterstory.me\\\/publications\\\/StoryThesisDefense.pdf\",\"filesize\":95494,\"downloadurl\":\"https:\\\/\\\/faculty180.interfolio.com\\\/public\\\/download.php?key=SDRwNCtxSUpsamxBQ213WS9ucHFuNnMwT0hzQU11b2RPQkJ2cWc3amxyUmNRdVVXTkF4MU1zT21qREtJZEdWZ1RsSm9mZnVZZG1KWFlJYzNhaU9UMGNLejRNZU5SSzV2SDdtSDV1MDBRRUk0VlZML3FMVmlQVjN2ZkkzekdMc0UrWkZZaStqeEE0YWJ4Y0pXMGo3eXdtTkVOM0VDc3dkSEMvc2xPV2JZV0lLZ2hyWmVsTUlyOGc9PQ%3D%3D\"}],\"coauthors_list\":[\"Peter G Story\"],\"sort_date\":\"2021-1-01\"}]","cu_faculty_awards_and_grants":"","cu_faculty_title":"Assistant Professor, Computer Science","cu_faculty_department":"Computer Science","cu_faculty_affiliated_departments":"Computer Science","footnotes":""},"cu_faculty_group":[],"cu_faculty_department":[4],"cu_faculty_position":[],"class_list":["post-1271","cu_faculty","type-cu_faculty","status-publish","has-post-thumbnail","hentry","cu_faculty_department-computer-science"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Peter Story | Faculty<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.clarku.edu\/faculty\/profiles\/peter-story\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Peter Story\" \/>\n<meta property=\"og:description\" content=\"Dr. Peter Story researches usable security and privacy. As digital technologies become ever more intertwined with our lives, security and privacy have never been more important. People can protect themselves from digital threats by using protective technologies, such as secure mobile payment systems like Apple Pay and privacy tools like Tor Browser. However, protective technologies [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.clarku.edu\/faculty\/profiles\/peter-story\/\" \/>\n<meta property=\"og:site_name\" content=\"Faculty\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T01:37:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.clarku.edu\/faculty\/wp-content\/uploads\/sites\/5\/2024\/12\/Peter-Story-720x720-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/profiles\\\/peter-story\\\/\",\"url\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/profiles\\\/peter-story\\\/\",\"name\":\"Peter Story | Faculty\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/profiles\\\/peter-story\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/profiles\\\/peter-story\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2024\\\/12\\\/Peter-Story-720x720-1.jpg\",\"datePublished\":\"2024-12-24T15:26:15+00:00\",\"dateModified\":\"2026-04-06T01:37:10+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/profiles\\\/peter-story\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/profiles\\\/peter-story\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2024\\\/12\\\/Peter-Story-720x720-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2024\\\/12\\\/Peter-Story-720x720-1.jpg\",\"width\":720,\"height\":720,\"caption\":\"Peter Story\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/wp-json\\\/wp\\\/v2\\\/cu_faculty\\\/1271#breadcrumbs\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":0,\"name\":\"ClarkU\",\"item\":\"https:\\\/\\\/www.clarku.edu\\\/\"},{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Faculty\",\"item\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Profiles\",\"item\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/wp-json\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Profiles\",\"item\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/wp-json\\\/wp\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Profiles\",\"item\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/wp-json\\\/wp\\\/v2\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Profiles\",\"item\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/wp-json\\\/wp\\\/v2\\\/cu_faculty\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Profiles\",\"item\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/wp-json\\\/wp\\\/v2\\\/cu_faculty\\\/1271\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/#website\",\"url\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/\",\"name\":\"Faculty\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.clarku.edu\\\/faculty\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Peter Story | Faculty","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.clarku.edu\/faculty\/profiles\/peter-story\/","og_locale":"en_US","og_type":"article","og_title":"Peter Story","og_description":"Dr. Peter Story researches usable security and privacy. As digital technologies become ever more intertwined with our lives, security and privacy have never been more important. People can protect themselves from digital threats by using protective technologies, such as secure mobile payment systems like Apple Pay and privacy tools like Tor Browser. However, protective technologies [&hellip;]","og_url":"https:\/\/www.clarku.edu\/faculty\/profiles\/peter-story\/","og_site_name":"Faculty","article_modified_time":"2026-04-06T01:37:10+00:00","og_image":[{"width":720,"height":720,"url":"https:\/\/www.clarku.edu\/faculty\/wp-content\/uploads\/sites\/5\/2024\/12\/Peter-Story-720x720-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.clarku.edu\/faculty\/profiles\/peter-story\/","url":"https:\/\/www.clarku.edu\/faculty\/profiles\/peter-story\/","name":"Peter Story | Faculty","isPartOf":{"@id":"https:\/\/www.clarku.edu\/faculty\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.clarku.edu\/faculty\/profiles\/peter-story\/#primaryimage"},"image":{"@id":"https:\/\/www.clarku.edu\/faculty\/profiles\/peter-story\/#primaryimage"},"thumbnailUrl":"https:\/\/www.clarku.edu\/faculty\/wp-content\/uploads\/sites\/5\/2024\/12\/Peter-Story-720x720-1.jpg","datePublished":"2024-12-24T15:26:15+00:00","dateModified":"2026-04-06T01:37:10+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.clarku.edu\/faculty\/profiles\/peter-story\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.clarku.edu\/faculty\/profiles\/peter-story\/#primaryimage","url":"https:\/\/www.clarku.edu\/faculty\/wp-content\/uploads\/sites\/5\/2024\/12\/Peter-Story-720x720-1.jpg","contentUrl":"https:\/\/www.clarku.edu\/faculty\/wp-content\/uploads\/sites\/5\/2024\/12\/Peter-Story-720x720-1.jpg","width":720,"height":720,"caption":"Peter Story"},{"@type":"BreadcrumbList","@id":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/cu_faculty\/1271#breadcrumbs","itemListElement":[{"@type":"ListItem","position":0,"name":"ClarkU","item":"https:\/\/www.clarku.edu\/"},{"@type":"ListItem","position":1,"name":"Faculty","item":"https:\/\/www.clarku.edu\/faculty"},{"@type":"ListItem","position":2,"name":"Profiles","item":"https:\/\/www.clarku.edu\/faculty\/wp-json"},{"@type":"ListItem","position":3,"name":"Profiles","item":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp"},{"@type":"ListItem","position":4,"name":"Profiles","item":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2"},{"@type":"ListItem","position":5,"name":"Profiles","item":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/cu_faculty"},{"@type":"ListItem","position":6,"name":"Profiles","item":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/cu_faculty\/1271"}]},{"@type":"WebSite","@id":"https:\/\/www.clarku.edu\/faculty\/#website","url":"https:\/\/www.clarku.edu\/faculty\/","name":"Faculty","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.clarku.edu\/faculty\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/cu_faculty\/1271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/cu_faculty"}],"about":[{"href":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/types\/cu_faculty"}],"version-history":[{"count":2,"href":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/cu_faculty\/1271\/revisions"}],"predecessor-version":[{"id":35671,"href":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/cu_faculty\/1271\/revisions\/35671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/media\/1976"}],"wp:attachment":[{"href":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/media?parent=1271"}],"wp:term":[{"taxonomy":"cu_faculty_group","embeddable":true,"href":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/cu_faculty_group?post=1271"},{"taxonomy":"cu_faculty_department","embeddable":true,"href":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/cu_faculty_department?post=1271"},{"taxonomy":"cu_faculty_position","embeddable":true,"href":"https:\/\/www.clarku.edu\/faculty\/wp-json\/wp\/v2\/cu_faculty_position?post=1271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}