{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T06:06:22Z","timestamp":1769407582733,"version":"3.49.0"},"reference-count":0,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["PoPETs"],"abstract":"<jats:p>Prioritizing privacy and security advice is a particular challenge for at-risk users, requiring difficult judgment calls with the risk of harmful consequences. We interviewed 18 experts who tailor privacy and security advice for at-risk users in personalized consultations and trainings, to understand their strategies and challenges. We identify five main objectives that experts balance as they differentiate the content and delivery of advice, and we explore how different types of context about clients are used to achieve those objectives. We also describe four methods used to ascertain this context, which have different trade-offs regarding priorities such as using time efficiently and managing the reliability of information. Through this, we especially focus on the challenges and rationales that motivate providers to follow particular practices. By surfacing choices that experts make about advice differentiation and by identifying areas for researchers and technologists to assist experts, our work can inform next steps in research, tool design, and ultimately better advice for at-risk users.<\/jats:p>","DOI":"10.56553\/popets-2026-0017","type":"journal-article","created":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T18:59:00Z","timestamp":1769367540000},"page":"321-337","source":"Crossref","is-referenced-by-count":0,"title":["How Experts Personalize Privacy &amp; Security Advice for At-Risk Users"],"prefix":"10.56553","volume":"2026","author":[{"given":"Wentao","family":"Guo","sequence":"first","affiliation":[{"name":"University of Maryland"}]},{"given":"Alexander","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Maryland"}]},{"given":"Nathan","family":"Malkin","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology"}]},{"given":"Michelle","family":"Mazurek","sequence":"additional","affiliation":[{"name":"University of Maryland"}]}],"member":"35752","published-online":{"date-parts":[[2026,1]]},"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"deposited":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T18:59:05Z","timestamp":1769367545000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2026\/popets-2026-0017.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["10.56553\/popets-2026-0017"],"URL":"https:\/\/doi.org\/10.56553\/popets-2026-0017","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}