ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings 2016 Workshop on Usable Security
Latest Publications
TOTAL DOCUMENTS
11
(FIVE YEARS 0)
H-INDEX
4
(FIVE YEARS 0)
Published By Internet Society
1891562428
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Information Disclosure Concerns in The Age of Wearable Computing
Proceedings 2016 Workshop on Usable Security
◽
10.14722/usec.2016.23006
◽
2016
◽
Cited By ~ 13
Author(s):
Linda Lee
◽
JoongHwa Lee
◽
Serge Egelman
◽
David Wagner
Keyword(s):
Information Disclosure
◽
Wearable Computing
Download Full-text
AuntieTuna: Personalized Content-based Phishing Detection
Proceedings 2016 Workshop on Usable Security
◽
10.14722/usec.2016.23012
◽
2016
◽
Cited By ~ 9
Author(s):
Calvin Ardi
◽
John Heidemann
Keyword(s):
Phishing Detection
Download Full-text
An Exploratory Study of User Perceptions of Payment Methods in UK and the US
Proceedings 2016 Workshop on Usable Security
◽
10.14722/usec.2016.23018
◽
2016
◽
Cited By ~ 1
Author(s):
Kat Krol
◽
Muhammad Sajidur Rahman
◽
Simon Parkin
◽
Emiliano De Cristofaro
◽
Eugene Y. Vasserman
Keyword(s):
Exploratory Study
◽
User Perceptions
◽
Payment Methods
◽
The Us
Download Full-text
Analyzing the Impact of Collection Methods and Demographics for Android's Pattern Unlock
Proceedings 2016 Workshop on Usable Security
◽
10.14722/usec.2016.23025
◽
2016
◽
Cited By ~ 1
Author(s):
Adam Aviv
◽
Justin Maguire
◽
Jeanne Luning-Prak
Keyword(s):
The Impact
◽
Collection Methods
Download Full-text
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do
Proceedings 2016 Workshop on Usable Security
◽
10.14722/usec.2016.23016
◽
2016
◽
Cited By ~ 2
Author(s):
Oksana Kulyk
◽
Paul Gerber
◽
Michael El Hanafi
◽
Benjamin Reinheimer
◽
Karen Renaud
◽
...
Keyword(s):
Smartphone App
Download Full-text
Real-World Decision Making: Logging Into Secure vs. Insecure Websites
Proceedings 2016 Workshop on Usable Security
◽
10.14722/usec.2016.23023
◽
2016
◽
Cited By ~ 2
Author(s):
Timothy Kelley
◽
Bennett I. Bertenthal
Keyword(s):
Decision Making
◽
Real World
Download Full-text
Watching Them Watching Me: Browser Extensions Impact on User Privacy Awareness and Concern
Proceedings 2016 Workshop on Usable Security
◽
10.14722/usec.2016.23017
◽
2016
◽
Cited By ~ 16
Author(s):
Florian Schaub
◽
Aditya Marella
◽
Pranshu Kalvani
◽
Blase Ur
◽
Chao Pan
◽
...
Keyword(s):
User Privacy
◽
Browser Extensions
Download Full-text
Testing Computer-Aided Mnemonics and Feedback for Fast Memorization of High-Value Secrets
Proceedings 2016 Workshop on Usable Security
◽
10.14722/usec.2016.23010
◽
2016
◽
Author(s):
Sauvik Das
◽
Jason Hong
◽
Stuart Schechter
Keyword(s):
Computer Aided
Download Full-text
Understanding Saudis' Privacy Concerns When Using WhatsApp
Proceedings 2016 Workshop on Usable Security
◽
10.14722/usec.2016.23022
◽
2016
◽
Cited By ~ 6
Author(s):
Yasmeen Rashidi
◽
Kami Vaniea
◽
L. Jean Camp
Keyword(s):
Privacy Concerns
Download Full-text
Better the Devil You Know: A User Study of Two CAPTCHAs and a Possible Replacement Technology
Proceedings 2016 Workshop on Usable Security
◽
10.14722/usec.2016.23013
◽
2016
◽
Cited By ~ 2
Author(s):
Kat Krol
◽
Simon Parkin
◽
M. Angela Sasse
Keyword(s):
User Study
◽
The Devil
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close