Michelle P. Steves, Kristen K. Greene, Mary F. Theofanos (National Institute of Standards and Technology)
A Phish Scale: Rating Human Phishing Message Detection Difficulty
View More Papers
User Comprehension and Comfort with Eye-Tracking and Hand-Tracking Permissions...
Kaiming Cheng (University of Washington), Mattea Sim (Indiana University), Tadayoshi Kohno (University of Washington), Franziska Roesner (University of Washington)
Read MoreFrom Paranoia to Compliance: The Bumpy Road of System...
Niklas Busch (CISPA Helmholtz Center for Information Security, Germany), Philip Klostermeyer (CISPA Helmholtz Center for Information Security, Germany), Jan H. Klemmer (CISPA Helmholtz Center for Information Security, Germany), Yasemin Acar (Paderborn University, Germany), Sascha Fahl (CISPA Helmholtz Center for Information Security, Germany)
Read MoreEvaluating Personal Data Control In Mobile Applications Using Heuristics
Alain Giboin (UCA, INRIA, CNRS, I3S), Karima Boudaoud (UCA, CNRS, I3S), Patrice Pena (Userthink), Yoann Bertrand (UCA, CNRS, I3S), Fabien Gandon (UCA, INRIA, CNRS, I3S)
Read MoreWhy Do Programmers Do What They Do? A Theory...
Lavanya Sajwan, James Noble, Craig Anslow (Victoria University of Wellington), Robert Biddle (Carleton University)
Read More