Users are not the enemy A Adams, MA Sasse Communications of the ACM 42 (12), 40-46, 1999 | 2408 | 1999 |
Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security MA Sasse, S Brostoff, D Weirich BT technology journal 19 (3), 122-131, 2001 | 1042 | 2001 |
The mechanics of trust: A framework for research and design J Riegelsberger, MA Sasse, JD McCarthy International journal of human-computer studies 62 (3), 381-422, 2005 | 711 | 2005 |
" Stuff goes into the computer and doesn't come out" a cross-tool study of personal information management R Boardman, MA Sasse Proceedings of the SIGCHI conference on Human factors in computing systems …, 2004 | 629 | 2004 |
Cyber security awareness campaigns: Why do they fail to change behaviour? M Bada, AM Sasse, JRC Nurse arXiv preprint arXiv:1901.02672, 2019 | 618 | 2019 |
Are Passfaces more usable than passwords? A field trial investigation S Brostoff, MA Sasse People and computers XIV—usability or else! Proceedings of HCI 2000, 405-424, 2000 | 581 | 2000 |
The impact of avatar realism and eye gaze control on perceived quality of communication in a shared immersive virtual environment M Garau, M Slater, V Vinayagamoorthy, A Brogni, A Steed, MA Sasse Proceedings of the SIGCHI conference on Human factors in computing systems …, 2003 | 547 | 2003 |
The true cost of unusable password policies: password use in the wild PG Inglesant, MA Sasse Proceedings of the sigchi conference on human factors in computing systems …, 2010 | 507 | 2010 |
Reliable audio for use over the Internet V Hardman, MA Sasse, M Handley, A Watson Proceedings of INET 95, 171-178, 1995 | 441 | 1995 |
The compliance budget: managing security behaviour in organisations A Beautement, MA Sasse, M Wonham Proceedings of the 2008 new security paradigms workshop, 47-58, 2008 | 433 | 2008 |
The impact of eye gaze on communication using humanoid avatars M Garau, M Slater, S Bee, MA Sasse Proceedings of the SIGCHI conference on Human factors in computing systems …, 2001 | 414 | 2001 |
The researcher's dilemma: evaluating trust in computer-mediated communication J Riegelsberger, MA Sasse, JD McCarthy International Journal of Human-Computer Studies 58 (6), 759-781, 2003 | 323 | 2003 |
Pretty good persuasion: a first step towards effective password security in the real world D Weirich, MA Sasse Proceedings of the 2001 workshop on New security paradigms, 137-143, 2001 | 298 | 2001 |
Coordinating the interruption of people in human-computer interaction. DC McFarlane Interact 99 (1999), 295, 1999 | 298 | 1999 |
Shiny happy people building trust? Photos on e-commerce websites and consumer trust J Riegelsberger, MA Sasse, JD McCarthy Proceedings of the SIGCHI conference on Human factors in computing systems …, 2003 | 291 | 2003 |
Measuring perceived quality of speech and video in multimedia conferencing applications A Watson, MA Sasse Proceedings of the sixth ACM international conference on Multimedia, 55-60, 1998 | 273 | 1998 |
Making passwords secure and usable A Adams, MA Sasse, P Lunt People and computers XII: proceedings of HCI’97, 1-19, 1997 | 270 | 1997 |
Who owns the data? Open data for healthcare P Kostkova, H Brewer, S De Lusignan, E Fottrell, B Goldacre, G Hart, ... Frontiers in public health 4, 7, 2016 | 254 | 2016 |
’Knowing me, knowing you’—Using profiles and social networking to improve recommender systems P Bonhard, MA Sasse BT Technology Journal 24 (3), 84-98, 2006 | 251 | 2006 |
Sharp or smooth? Comparing the effects of quantization vs. frame rate for streamed video JD McCarthy, MA Sasse, D Miras Proceedings of the SIGCHI conference on Human factors in computing systems …, 2004 | 247 | 2004 |