Serge Egelman
Serge Egelman
University of California, Berkeley / International Computer Science Institute (ICSI)
Dirección de correo verificada de
Citado por
Citado por
Android Permissions: User Attention, Comprehension, and Behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
The effect of online privacy information on purchasing behavior: An experimental study
JY Tsai, S Egelman, L Cranor, A Acquisti
Information Systems Research 22 (2), 254-268, 2011
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, J Hong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
Crying Wolf: An Empirical Study of SSL Warning Effectiveness.
J Sunshine, S Egelman, H Almuhimedi, N Atri, LF Cranor
USENIX Security Symposium, 399-416, 2009
Phinding phish: Evaluating anti-phishing tools
Y Zhang, S Egelman, L Cranor, J Hong
Network and Distributed Systems Symposium (NDSS), 2006
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
AP Felt, S Egelman, D Wagner
Proceedings of the second ACM workshop on Security and privacy in …, 2012
Facebook and Privacy: It’s Complicated
M Johnson, S Egelman, SM Bellovin
Symposium on Usable Privacy and Security (SOUPS), 2012
Does my password go up to eleven?: the impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
It's no secret. measuring the security and reliability of authentication via “secret” questions
S Schechter, AJB Brush, S Egelman
2009 30th IEEE Symposium on Security and Privacy, 375-390, 2009
Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS)
S Egelman, E Peer
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
Android Permissions Remystified: A Field Study on Contextual Integrity.
P Wijesekera, A Baokar, A Hosseini, S Egelman, D Wagner, K Beznosov
USENIX Security Symposium, 499-514, 2015
Are You Ready to Lock?
S Egelman, S Jain, RS Portnoff, K Liao, S Consolvo, D Wagner
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Choice architecture and smartphone privacy: There’s a price for that
S Egelman, AP Felt, D Wagner
The Economics of Information Security and Privacy, 211-236, 2013
Timing is everything?: the effects of timing and placement of online privacy indicators
S Egelman, J Tsai, LF Cranor, A Acquisti
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
How to ask for permission
AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner
USENIX Workshop on Hot Topics in Security, 2012
The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens
M Harbach, A De Luca, S Egelman
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences
P Wijesekera, A Baokar, L Tsai, J Reardon, S Egelman, D Wagner, ...
2017 IEEE Symposium on Security and Privacy (SP), 1077-1093, 2017
It's not what you know, but who you know: a social approach to last-resort authentication
S Schechter, S Egelman, RW Reeder
Proceedings of the 27th international conference on Human factors in …, 2009
Oops, I did it again: mitigating repeated access control errors on facebook
S Egelman, A Oates, S Krishnamurthi
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20