Trust in automation: Integrating empirical evidence on factors that influence trust KA Hoff, M Bashir Human factors 57 (3), 407-434, 2015 | 2218 | 2015 |
Who uses bitcoin? an exploration of the bitcoin community J Bohr, M Bashir 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 282 | 2014 |
Use of apps in the COVID-19 response and the loss of privacy protection T Sharma, M Bashir Nature Medicine 26 (8), 1165-1167, 2020 | 167 | 2020 |
Tracing information flows between ad exchanges using retargeted ads MA Bashir, S Arshad, W Robertson, C Wilson 25th USENIX Security Symposium (USENIX Security 16), 481-496, 2016 | 151 | 2016 |
Information privacy and data control in cloud computing: Consumers, privacy preferences, and market efficiency JP Kesan, CM Hayes, MN Bashir Wash. & Lee L. Rev. 70, 341, 2013 | 92 | 2013 |
Online privacy and informed consent: The dilemma of information asymmetry M Bashir, C Hayes, AD Lambert, JP Kesan Proceedings of the Association for Information Science and Technology 52 (1 …, 2015 | 83 | 2015 |
Users’ adoption of mental health apps: examining the impact of information cues HY Huang, M Bashir JMIR mHealth and uHealth 5 (6), e6827, 2017 | 71 | 2017 |
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool M Bashir, C Wee, N Memon, B Guo Computers & Security 65, 153-165, 2017 | 70 | 2017 |
What motivates people to use Bitcoin? M Bashir, B Strickland, J Bohr Social Informatics: 8th International Conference, SocInfo 2016, Bellevue, WA …, 2016 | 62 | 2016 |
Developing a new digital forensics curriculum A Lang, M Bashir, R Campbell, L DeStefano Digital Investigation 11, S76-S84, 2014 | 59 | 2014 |
“What is your evidence?” A study of controversial topics on social media A Addawood, M Bashir Proceedings of the Third Workshop on Argument Mining (ArgMining2016), 1-11, 2016 | 56 | 2016 |
A comprehensive empirical study of data privacy, trust, and consumer autonomy JP Kesan, CM Hayes, MN Bashir Ind. LJ 91, 267, 2015 | 51 | 2015 |
Cloud standards in comparison: Are new security frameworks improving cloud security? C Di Giulio, R Sprabery, C Kamhoua, K Kwiat, RH Campbell, MN Bashir 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 50-57, 2017 | 45 | 2017 |
On the Memorability of System-generated {PINs}: Can Chunking Help? JH Huh, H Kim, RB Bobba, MN Bashir, K Beznosov eleventh symposium on usable privacy and security (SOUPS 2015), 197-209, 2015 | 40 | 2015 |
Stance classification of twitter debates: The encryption debate as a use case A Addawood, J Schneider, M Bashir Proceedings of the 8th international conference on Social Media & Society, 1-10, 2017 | 38 | 2017 |
A theoretical model for trust in automated systems K Hoff, M Bashir CHI'13 extended abstracts on human factors in computing systems, 115-120, 2013 | 30 | 2013 |
The onion router: Understanding a privacy enhancing technology community HY Huang, M Bashir Proceedings of the Association for Information Science and Technology 53 (1 …, 2016 | 29 | 2016 |
A case study-based cybersecurity ethics curriculum J Blanken-Webb, I Palmer, SE Deshaies, NC Burbules, RH Campbell, ... 2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018 | 26 | 2018 |
An examination of the vocational and psychological characteristics of cybersecurity competition participants M Bashir, A Lambert, JMC Wee, B Guo 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015 | 26 | 2015 |
Enabling user-centered privacy controls for mobile applications: COVID-19 perspective T Sharma, HA Dyer, M Bashir ACM Transactions on Internet Technology (TOIT) 21 (1), 1-24, 2021 | 25 | 2021 |