Name
Affiliation
Papers
SONIA CHIASSON
Carleton University, Ottawa, ON, Canada
78
Collaborators
Citations 
PageRank 
82
919
58.49
Referers 
Referees 
References 
1399
1033
756
Search Limit
1001000
Title
Citations
PageRank
Year
Privacy and Safety on Social Networking Sites: Autistic and Non-Autistic Teenagers’ Attitudes and Behaviors00.342022
“It’s So Difficult to Sever that Connection”: The Role of FoMO in Users’ Reluctant Privacy Behaviours00.342021
"Whether It'S Moral Is A Whole Other Story": Consumer Perspectives On Privacy Regulations And Corporate Data Practices00.342021
Replication: Effects Of Media On The Mental Models Of Technical Users00.342021
"I'M Literally Just Hoping This Will Work:" Obstacles Blocking The Online Security And Privacy Of Users With Visual Disabilities00.342021
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens00.342021
“I’m Not a Millionaire”: How Users’ Online Behaviours and Offline Behaviours Impact Their Privacy00.342021
“They think it’s totally fine to talk to somebody on the internet they don’t know”: Teachers’ perceptions and mitigation strategies of tweens’ online risks00.342021
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols00.342021
Empirical Analysis and Privacy Implications in OAuth-based Single Sign-On Systems00.342021
A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education00.342021
Understanding Fitness Tracker Users' Security and Privacy Knowledge, Attitudes and Behaviours00.342020
The Influence of Decaying the Representation of Older Social Media Content on Simulated Hiring Decisions20.382020
"I'm hoping they're an ethical company that won't do anything that I'll regret": Users Perceptions of At-home DNA Testing Companies10.362020
'Lime', 'Open Lock', and 'Blocked': Children's Perception of Colors, Symbols, and Words in Cybersecurity Warnings00.342020
'Think secure from the beginning' - A Survey with Software Developers.50.442019
Control and Understanding in Malware and Legitimate Software00.342019
Mixed Pictures: Mental Models of Malware00.342019
Opt out of privacy or "go home" - understanding reluctant privacy behaviours through the FoMO-centric design paradigm.00.342019
End-Users and Service Providers: Trust and Distributed Responsibility for Account Security00.342019
Exploring the Impact of Colour-Blindness on Computer Game Performance.00.342018
Security in the Software Development Lifecycle.10.352018
An Exploratory Study Of Children'S Online Password Behaviours00.342018
A Day In The Life Of Jos: A Web-Based Game To Increase Children'S Digital Literacy10.352018
Privacy Concerns Amidst OBA and the Need for Alternative Models.10.352018
Online Privacy and Aging of Digital Artifacts.00.342018
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach.10.362018
Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers00.342018
Cyberheroes: an interactive ebook for improving children's online privacy.00.342017
No Passwords Needed: The Iterative Design Of A Parent-Child Authentication Mechanism00.342017
When private and professional lives meet: The impact of digital footprints on employees and political candidates00.342017
Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy30.512017
Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper).00.342017
Engaging Children About Online Privacy Through Storytelling in an Interactive Comic.00.342017
Secure comics: an interactive comic series for improving cyber security and privacy.00.342017
Teaching With An Interactive E-Book To Improve Children'S Online Privacy Knowledge10.352016
An Eye-tracking Evaluation of Driver Distraction and Unfamiliar Road Signs.00.342016
Bend Passwords: using gestures to authenticate on flexible devices.40.442016
An Exploration of Graphical Password Authentication for Children.10.362016
The Role Of Instructional Design In Persuasion: A Comics Approach For Improving Cybersecurity40.412016
From Nosy Little Brothers To Stranger-Danger: Children And Parents' Perception Of Mobile Threats100.702016
User Perceptions of Sharing, Advertising, and Tracking110.592015
Choose Your Own Authentication50.502015
User-Centred Authentication Feature Framework10.352015
What's the deal with privacy apps?: a comprehensive exploration of user perception and usability10.352015
Heuristics for the evaluation of captchas on smartphones30.402015
Quantifying the security advantage of password expiration policies70.502015
Why phishing still works: User strategies for combating phishing attacks70.432015
Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices00.342014
Stop Clicking on "Update Later": Persuading Users They Need Up-to-Date Antivirus Protection.00.342014
  • 1
  • 2