Identifying User Needs for Advertising Controls on Facebook | 0 | 0.34 | 2022 |
Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels | 1 | 0.35 | 2022 |
Is a Privacy Crisis Experienced, a Privacy Crisis Avoided? | 0 | 0.34 | 2022 |
Lessons from the loo | 0 | 0.34 | 2021 |
Which Privacy and Security Attributes Most Impact Consumers’ Risk Perception and Willingness to Purchase IoT Devices? | 1 | 0.35 | 2021 |
Informing California privacy regulations with evidence from research | 0 | 0.34 | 2021 |
“Did you know this camera tracks your mood?”: Understanding Privacy Expectations and Preferences in the Age of Video Analytics | 0 | 0.34 | 2021 |
A Discussion of Election Security, Cryptography, and Exceptional Access With Michael Alan Specter | 0 | 0.34 | 2021 |
“You Gotta Watch What You Say”: Surveillance of Communication with Incarcerated People | 0 | 0.34 | 2021 |
Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text | 1 | 0.38 | 2020 |
Disposition toward privacy and information disclosure in the context of emerging health technologies. | 1 | 0.36 | 2019 |
SIGCHI Social Impact Award Talk - Making Privacy and Security More Usable. | 0 | 0.34 | 2018 |
The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios. | 1 | 0.37 | 2018 |
"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University. | 3 | 0.51 | 2018 |
Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing. | 0 | 0.34 | 2018 |
Fast, Lean, And Accurate: Modeling Password Guessability Using Neural Networks | 23 | 0.81 | 2017 |
Design and Evaluation of a Data-Driven Password Meter. | 18 | 0.75 | 2017 |
Privacy Expectations and Preferences in an IoT World. | 5 | 0.47 | 2017 |
Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. | 9 | 0.57 | 2016 |
Do Users' Perceptions of Password Security Match Reality? | 24 | 0.82 | 2016 |
Towards a Privacy Research Roadmap for the Computing Community. | 2 | 0.48 | 2016 |
Designing Password Policies for Strength and Usability. | 24 | 0.96 | 2016 |
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior | 12 | 0.55 | 2015 |
The Impact of Timing on the Salience of Smartphone App Privacy Notices | 11 | 0.59 | 2015 |
Measuring real-world accuracies and biases in modeling password guessability | 32 | 0.98 | 2015 |
Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging | 28 | 1.23 | 2015 |
A Design Space for Effective Privacy Notices | 41 | 1.31 | 2015 |
I Would Like To..., I Shouldn't..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites | 8 | 0.47 | 2015 |
Better Together: Usability and Security Go Hand in Hand | 1 | 0.36 | 2014 |
Telepathwords: preventing weak passwords by reading users' minds | 21 | 0.75 | 2014 |
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. | 12 | 0.55 | 2014 |
Improving App Privacy: Nudging App Developers to Protect User Privacy | 24 | 0.87 | 2014 |
Building the security behavior observatory: an infrastructure for long-term monitoring of client machines | 3 | 0.40 | 2014 |
Can long passwords be secure and usable? | 50 | 1.52 | 2014 |
Electronic privacy and surveillance | 0 | 0.34 | 2014 |
"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets | 35 | 1.30 | 2013 |
Measuring password guessability for an entire university | 80 | 2.16 | 2013 |
A Shortage of Privacy Engineers | 9 | 0.80 | 2013 |
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs. | 2 | 0.40 | 2013 |
"Little brothers watching you": raising awareness of data leaks on smartphones | 24 | 0.85 | 2013 |
Privacy nudges for social media: an exploratory Facebook study | 42 | 1.45 | 2013 |
Tag, you can see it!: using tags for access control in photo sharing | 39 | 1.19 | 2012 |
A conundrum of permissions: installing applications on an android smartphone | 117 | 4.60 | 2012 |
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms | 143 | 4.74 | 2012 |
Out of sight, out of mind: Effects of displaying access-control information near the item it controls | 10 | 0.55 | 2012 |
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs | 5 | 0.54 | 2012 |
Can Users Control Online Behavioral Advertising Effectively? | 4 | 0.48 | 2012 |
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems | 50 | 1.81 | 2012 |
How does your password measure up? the effect of strength meters on password creation | 88 | 2.78 | 2012 |
Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share | 68 | 2.35 | 2011 |