-
1
-
-
84869388345
-
PScout: Analyzing the android permission specification
-
Au, K. W. Y., Zhou, Y. F., Huang, Z., and Lie, D. PScout: Analyzing the Android Permission Specification. In Proc. CCS (2012)
-
(2012)
Proc. CCS
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
2
-
-
70350728911
-
Social applications: Exploring a more secure framework
-
Besmer, A., Lipford, H. R., Shehab, M., and Cheek, G. Social Applications: Exploring A More Secure Framework. In Proc. SOUPS (2009)
-
(2009)
Proc. SOUPS
-
-
Besmer, A.1
Lipford, H.R.2
Shehab, M.3
Cheek, G.4
-
4
-
-
85023742255
-
What is still wrong with security warnings: A mental models approach
-
Bravo-Lillo, C., Cranor, L., Downs, J., and Komanduri, S. What Is Still Wrong With Security Warnings: A Mental Models Approach. In Proc. SOUPS (2010)
-
(2010)
Proc. SOUPS
-
-
Bravo-Lillo, C.1
Cranor, L.2
Downs, J.3
Komanduri, S.4
-
5
-
-
79953645142
-
Bridging the gap in computer security warnings: A mental model approach
-
IEEE
-
Bravo-Lillo, C., Cranor, L., Downs, J., and Komanduri, S. Bridging the Gap in Computer Security Warnings: A Mental Model Approach. Security Privacy, IEEE 9, 2 (2011), 18-26
-
(2011)
Security Privacy
, vol.9
, Issue.2
, pp. 18-26
-
-
Bravo-Lillo, C.1
Cranor, L.2
Downs, J.3
Komanduri, S.4
-
6
-
-
84883097982
-
Your attention please: Designing security-decision uis to make genuine risks harder to ignore
-
Bravo-Lillo, C., Cranor, L. F., Downs, J., Komanduri, S., Reeder, R. W., Schechter, S., and Sleeper, M. Your Attention Please: Designing Security-Decision UIs to Make Genuine Risks Harder to Ignore. In Proc. SOUPS (2013)
-
(2013)
Proc. SOUPS
-
-
Bravo-Lillo, C.1
Cranor, L.F.2
Downs, J.3
Komanduri, S.4
Reeder, R.W.5
Schechter, S.6
Sleeper, M.7
-
7
-
-
84900391073
-
Improving computer security dialogs
-
Bravo-Lillo, C., Cranor, L. F., Downs, J., Komanduri, S., and Sleeper, M. Improving Computer Security Dialogs. In Proc. INTERACT (2011)
-
(2011)
Proc. INTERACT
-
-
Bravo-Lillo, C.1
Cranor, L.F.2
Downs, J.3
Komanduri, S.4
Sleeper, M.5
-
8
-
-
84893108843
-
A framework for reasoning about the human in the loop
-
Cranor, L. A Framework for Reasoning About the Human in the Loop. UPSEC (2008)
-
(2008)
UPSEC
-
-
Cranor, L.1
-
9
-
-
84900421931
-
Two experiences designing for effective security
-
De Paula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D., Ren, J., Rode, J., et al. Two Experiences Designing for Effective Security. In Proc. SOUPS (2005)
-
(2005)
Proc. SOUPS
-
-
De Paula, R.1
Ding, X.2
Dourish, P.3
Nies, K.4
Pillet, B.5
Redmiles, D.6
Ren, J.7
Rode, J.8
-
10
-
-
84900430965
-
My Profile is my password, verify me! the privacy/convenience tradeoff of facebook connect
-
Egelman, S. My Profile Is My Password, Verify Me! The Privacy/Convenience Tradeoff of Facebook Connect. In Proc. CHI (2013)
-
(2013)
Proc. CHI
-
-
Egelman, S.1
-
11
-
-
60649111224
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
Egelman, S., Cranor, L. F., and Hong, J. You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. In Proc. CHI (2008)
-
(2008)
Proc. CHI
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
12
-
-
80755187788
-
Android permissions demystified
-
Felt, A. P., Chin, E., Hanna, S., and Wagner, D. Android Permissions Demystified. In Proc. CCS (2011)
-
(2011)
Proc. CCS
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Wagner, D.4
-
13
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. Android Permissions: User Attention, Comprehension, and Behavior. In Proc. SOUPS (2012)
-
(2012)
Proc. SOUPS
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
14
-
-
84900465347
-
Sorry, i don't get it: An analysis of warning message texts
-
Harbach, M., Fahl, S., Yakovleva, P., and Smith, M. Sorry, I Don't Get It: An Analysis of Warning Message Texts. In Proc USEC (2013)
-
(2013)
Proc USEC
-
-
Harbach, M.1
Fahl, S.2
Yakovleva, P.3
Smith, M.4
-
15
-
-
84864967646
-
Goldilocks and the two mobile devices: Going beyond all-or-nothing access to a device's applications
-
Hayashi, E., Riva, O., Strauss, K., Brush, A. J. B., and Schechter, S. Goldilocks and the Two Mobile Devices: Going Beyond All-Or-Nothing Access to a Device's Applications. In Proc. SOUPS (2012)
-
(2012)
Proc. SOUPS
-
-
Hayashi, E.1
Riva, O.2
Strauss, K.3
Brush, A.J.B.4
Schechter, S.5
-
16
-
-
84900424296
-
Expressions of expertness
-
Inglesant, P., Sasse, M. A., Chadwick, D., and Shi, L. L. Expressions of Expertness. In Proc. SOUPS (2008)
-
(2008)
Proc. SOUPS
-
-
Inglesant, P.1
Sasse, M.A.2
Chadwick, D.3
Shi, L.L.4
-
17
-
-
34548188542
-
Evaluating interfaces for privacy policy rule authoring
-
Karat, C.-M., Karat, J., Brodie, C., and Feng, J. Evaluating Interfaces for Privacy Policy Rule Authoring. In Proc. CHI (2006)
-
(2006)
Proc. CHI
-
-
Karat, C.-M.1
Karat, J.2
Brodie, C.3
Feng, J.4
-
18
-
-
84883077076
-
Privacy as part of the app decision-making process
-
Kelley, P. G., Cranor, L. F., and Sadeh, N. Privacy as Part of the App Decision-Making Process. In Proc. CHI (2013)
-
(2013)
Proc. CHI
-
-
Kelley, P.G.1
Cranor, L.F.2
Sadeh, N.3
-
20
-
-
85019170256
-
Whyper: Towards automating risk assessment of mobile applications
-
Pandita, R., Xiao, X., Yang, W., Enck, W., and Xie, T. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In Proc. USENIX Security Symposium (2013)
-
(2013)
Proc. USENIX Security Symposium
-
-
Pandita, R.1
Xiao, X.2
Yang, W.3
Enck, W.4
Xie, T.5
-
21
-
-
84865043423
-
Stories as informal lessons about security
-
Rader, E., Wash, R., and Brooks, B. Stories as Informal Lessons About Security. In Proc. SOUPS (2012)
-
(2012)
Proc. SOUPS
-
-
Rader, E.1
Wash, R.2
Brooks, B.3
-
22
-
-
84862937206
-
A brick wall, a locked door, and a bandit: A physical security metaphor for firewall warnings
-
Raja, F., Hawkey, K., Hsu, S., Wang, K., and Beznosov, K. A Brick Wall, a Locked Door, and a Bandit: A Physical Security Metaphor for Firewall Warnings. In Proc. SOUPS (2011)
-
(2011)
Proc SOUPS
-
-
Raja, F.1
Hawkey, K.2
Hsu, S.3
Wang, K.4
Beznosov, K.5
-
23
-
-
84926351578
-
Crying wolf: An empirical study of ssl warning effectiveness
-
Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., and Cranor, L. F. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proc. USENIX Security Symposium (2009)
-
(2009)
Proc. USENIX Security Symposium
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
24
-
-
0005658426
-
A consolidated communication-human information processing (c-hip) model
-
Wogalter, M., Dejoy, D. M., and Laughery, K. R. A Consolidated Communication-Human Information Processing (C-HIP) Model. Warnings and Risk Communication (1999), 15-23
-
(1999)
Warnings and Risk Communication
, pp. 15-23
-
-
Wogalter, M.1
Dejoy, D.M.2
Laughery, K.R.3
-
25
-
-
0028532053
-
Personalization of warning signs: The role of perceived relevance on behavioral compliance
-
Wogalter, M. S., Racicot, B. M., Kalsher, M. J., and Noel Simpson, S. Personalization of Warning Signs: The Role of Perceived Relevance on Behavioral Compliance. International Journal of Industrial Ergonomics 14, 3 (1994).
-
(1994)
International Journal of Industrial Ergonomics
, vol.14
, Issue.3
-
-
Wogalter, M.S.1
Racicot, B.M.2
Kalsher, M.J.3
Noel Simpson, S.4
|