Serge Egelman
Serge Egelman
University of California, Berkeley / International Computer Science Institute (ICSI)
Dirección de correo verificada de cs.berkeley.edu
Título
Citado por
Citado por
Año
Android Permissions: User Attention, Comprehension, and Behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
11552012
The effect of online privacy information on purchasing behavior: An experimental study
JY Tsai, S Egelman, L Cranor, A Acquisti
Information Systems Research 22 (2), 254-268, 2011
8482011
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, J Hong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
6792008
Crying Wolf: An Empirical Study of SSL Warning Effectiveness.
J Sunshine, S Egelman, H Almuhimedi, N Atri, LF Cranor
USENIX Security Symposium, 399-416, 2009
5222009
Phinding phish: Evaluating anti-phishing tools
Y Zhang, S Egelman, L Cranor, J Hong
Network and Distributed Systems Symposium (NDSS), 2006
472*2006
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
4282011
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
AP Felt, S Egelman, D Wagner
Proceedings of the second ACM workshop on Security and privacy in …, 2012
3132012
Facebook and Privacy: It’s Complicated
M Johnson, S Egelman, SM Bellovin
Symposium on Usable Privacy and Security (SOUPS), 2012
2432012
It's no secret. measuring the security and reliability of authentication via “secret” questions
S Schechter, AJB Brush, S Egelman
2009 30th IEEE Symposium on Security and Privacy, 375-390, 2009
2162009
Does my password go up to eleven?: the impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
2152013
Android Permissions Remystified: A Field Study on Contextual Integrity.
P Wijesekera, A Baokar, A Hosseini, S Egelman, D Wagner, K Beznosov
USENIX Security Symposium, 499-514, 2015
1772015
Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS)
S Egelman, E Peer
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
1762015
Are You Ready to Lock?
S Egelman, S Jain, RS Portnoff, K Liao, S Consolvo, D Wagner
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1732014
Choice architecture and smartphone privacy: There’s a price for that
S Egelman, AP Felt, D Wagner
The Economics of Information Security and Privacy, 211-236, 2013
1612013
Timing is everything?: the effects of timing and placement of online privacy indicators
S Egelman, J Tsai, LF Cranor, A Acquisti
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
1512009
How to ask for permission
AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner
USENIX Workshop on Hot Topics in Security, 2012
1462012
The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens
M Harbach, A De Luca, S Egelman
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1012016
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences
P Wijesekera, A Baokar, L Tsai, J Reardon, S Egelman, D Wagner, ...
2017 IEEE Symposium on Security and Privacy (SP), 1077-1093, 2017
932017
It's not what you know, but who you know: a social approach to last-resort authentication
S Schechter, S Egelman, RW Reeder
Proceedings of the 27th international conference on Human factors in …, 2009
892009
Oops, I did it again: mitigating repeated access control errors on facebook
S Egelman, A Oates, S Krishnamurthi
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
842011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20