Author of the publication

"...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices.

, , and . SOUPS, page 327-346. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The CareNet Display: Lessons Learned from an In Home Evaluation of an Ambient Display., , and . UbiComp, volume 3205 of Lecture Notes in Computer Science, page 1-17. Springer, (2004)Labscape: A Smart Environment for the Cell Biology Laboratory., , , , , , and . IEEE Pervasive Computing, 1 (3): 13-21 (2002)The Drop: pragmatic problems in the design of a compelling, pervasive game., , and . Computers in Entertainment, 3 (3): 4 (2005)SoK: A Framework for Unifying At-Risk User Research., , , , , , , , , and . CoRR, (2021)Helping You Protect You., , , , , and . IEEE Secur. Priv., 12 (1): 39-42 (2014)"She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households., , , , , and . CHI, page 5921-5932. ACM, (2016)Theory-driven design strategies for technologies that support behavior change in everyday life., , and . CHI, page 405-414. ACM, (2009)Designing Toxic Content Classification for a Diversity of Perspectives., , , , , , , and . SOUPS @ USENIX Security Symposium, page 299-318. USENIX Association, (2021)Rethinking Connection Security Indicators., , , , , , , , and . SOUPS, page 1-14. USENIX Association, (2016)Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy., , , , , , , , and . CHI, page 89. ACM, (2019)