Author of the publication

Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan.

, , , and . EuroS&P Workshops, page 150-159. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Advertisements on User Attention During Permission Authorization., , and . HCI (41), volume 12423 of Lecture Notes in Computer Science, page 722-739. Springer, (2020)User Perceptions of Gmail's Confidential Mode., , and . Proc. Priv. Enhancing Technol., 2022 (1): 187-206 (2022)Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East., , and . Future Internet, 13 (1): 10 (2021)The Effectiveness of Video Messaging Campaigns to Use 2FA., , and . HCI (27), volume 12788 of Lecture Notes in Computer Science, page 369-390. Springer, (2021)Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan., , , and . EuroS&P Workshops, page 150-159. IEEE, (2020)The Impact of Risk Appeal Approaches on Users' Sharing Confidential Information., , and . CHI, page 579:1-579:21. ACM, (2024)The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians., , and . SOUPS @ USENIX Security Symposium, page 31-46. USENIX Association, (2018)Managing Access to Confidential Documents: A Case Study of an Email Security Tool., , , , and . Future Internet, 15 (11): 356 (2023)"Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA., , , and . SACMAT, page 139-150. ACM, (2022)Replication: What Would Motivate Users to Use Gmail's Confidential Mode?, , , and . HICSS, page 7645-7654. ScholarSpace, (2024)