Access control for home data sharing: Attitudes, needs and practices ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010 | 181 | 2010 |
Betrayed by updates: how negative experiences affect future security KE Vaniea, E Rader, R Wash Proceedings of the SIGCHI conference on human factors in computing systems …, 2014 | 157 | 2014 |
Tales of Software Updates: The process of updating software K Vaniea, Y Rashidi Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2016 | 132 | 2016 |
Real life challenges in access-control management L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009 | 124 | 2009 |
Out of the loop: How automated software updates cause unintended security consequences R Wash, E Rader, K Vaniea, M Rizor 10th Symposium On Usable Privacy and Security (SOUPS 2014), 89-104, 2014 | 111 | 2014 |
A Survey on Developer-Centred Security M Tahaei, K Vaniea 4th European Workshop on Usable Security, 2019 | 102 | 2019 |
User-controllable security and privacy for pervasive computing J Cornwell, I Fette, G Hsieh, M Prabaker, J Rao, K Tang, K Vaniea, ... Eighth IEEE Workshop on Mobile Computing Systems and Applications, 14-19, 2007 | 92 | 2007 |
Understanding Privacy-Related Questions on Stack Overflow M Tahaei, K Vaniea, N Saphra Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2020 | 86 | 2020 |
Lessons learned from the deployment of a smartphone-based access-control system L Bauer, LF Cranor, MK Reiter, K Vaniea Proceedings of the 3rd Symposium on Usable Privacy and Security, 64-75, 2007 | 86 | 2007 |
Privacy champions in software teams: Understanding their motivations, strategies, and challenges M Tahaei, A Frik, K Vaniea Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021 | 75 | 2021 |
A user study of policy creation in a flexible access-control system L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008 | 75 | 2008 |
Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing F Mathis, JH Williamson, K Vaniea, M Khamis ACM Transactions on Computer-Human Interaction (ToCHI) 28 (1), 1-44, 2021 | 70 | 2021 |
Was my message read? privacy and signaling on Facebook messenger R Hoyle, S Das, A Kapadia, AJ Lee, K Vaniea Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017 | 65 | 2017 |
Debunking security-usability tradeoff myths MA Sasse, M Smith, C Herley, H Lipford, K Vaniea IEEE Security & Privacy 14 (5), 33-39, 2016 | 60 | 2016 |
What is this URL's Destination? Empirical Evaluation of Users' URL Reading SS Albakry, K Vaniea, M Wolters Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2020 | 57 | 2020 |
Rubikauth: Fast and secure authentication in virtual reality F Mathis, J Williamson, K Vaniea, M Khamis Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020 | 56 | 2020 |
More than skin deep: measuring effects of the underlying model on access-control system usability RW Reeder, L Bauer, LF Cranor, MK Reiter, K Vaniea Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011 | 53 | 2011 |
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems F Mathis, K Vaniea, M Khamis Proceedings of the 2021 chi conference on human factors in computing systems …, 2021 | 49 | 2021 |
I Don’t Need an Expert! Making URL Phishing Features Human Comprehensible K Althobaiti, N Meng, K Vaniea Conference on Human Factors in Computing Systems, 2021 | 44 | 2021 |
Understanding Saudis’ privacy concerns when using WhatsApp Y Rashidi, K Vaniea, LJ Camp Proceedings of the Workshop on Usable Security (USEC’16), 1-8, 2016 | 44 | 2016 |