Studying location privacy in mobile applications: 'predator vs. prey' probes. [Citation Graph (, )][DBLP]
School of phish: a real-word evaluation of anti-phishing training. [Citation Graph (, )][DBLP]
New directions in multisensory authentication. [Citation Graph (, )][DBLP]
The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing. [Citation Graph (, )][DBLP]
A multi-method approach for user-centered design of identity management systems. [Citation Graph (, )][DBLP]
Conditioned-safe ceremonies and a user study of an application to web authentication. [Citation Graph (, )][DBLP]
Personal choice and challenge questions: a security and usability assessment. [Citation Graph (, )][DBLP]
Usable deidentification of sensitive patient care data. [Citation Graph (, )][DBLP]
Designing for different levels of social inference risk. [Citation Graph (, )][DBLP]
A comparative study of online privacy policies and formats. [Citation Graph (, )][DBLP]
Designing and evaluating usable security and privacy technology. [Citation Graph (, )][DBLP]
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication. [Citation Graph (, )][DBLP]
Balancing usability and security in a video CAPTCHA. [Citation Graph (, )][DBLP]
Social applications: exploring a more secure framework. [Citation Graph (, )][DBLP]
Privacy stories: confidence in privacy behaviors through end user programming. [Citation Graph (, )][DBLP]
Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and security. [Citation Graph (, )][DBLP]
How does the emergence of reputation mechanisms affect the overall trust formation mechanisms, implicit and explicit, in the online environment? [Citation Graph (, )][DBLP]
The impact of privacy indicators on search engine browsing patterns. [Citation Graph (, )][DBLP]
Look into my eyes!: can you guess my password? [Citation Graph (, )][DBLP]
Escape from the matrix: lessons from a case-study in access-control requirements. [Citation Graph (, )][DBLP]
A new graphical password scheme against spyware by using CAPTCHA. [Citation Graph (, )][DBLP]
Who's viewed you?: the impact of feedback in a mobile location-sharing application. [Citation Graph (, )][DBLP]
Sanitization's slippery slope: the design and study of a text revision assistant. [Citation Graph (, )][DBLP]
BayeShield: conversational anti-phishing user interface. [Citation Graph (, )][DBLP]
Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden? [Citation Graph (, )][DBLP]