Android Permissions: User Attention, Comprehension, and Behavior AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner | 1530 | 2012 |
The effect of online privacy information on purchasing behavior: An experimental study JY Tsai, S Egelman, L Cranor, A Acquisti Information Systems Research 22 (2), 254-268, 2011 | 1253 | 2011 |
You've been warned: an empirical study of the effectiveness of web browser phishing warnings S Egelman, LF Cranor, J Hong Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008 | 871 | 2008 |
Crying Wolf: An Empirical Study of SSL Warning Effectiveness. J Sunshine, S Egelman, H Almuhimedi, N Atri, LF Cranor USENIX Security Symposium, 399-416, 2009 | 620 | 2009 |
Of passwords and people: measuring the effect of password-composition policies S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011 | 567 | 2011 |
Phinding phish: Evaluating anti-phishing tools Y Zhang, S Egelman, L Cranor, J Hong Network and Distributed Systems Symposium (NDSS), 2006 | 551* | 2006 |
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns AP Felt, S Egelman, D Wagner Proceedings of the second ACM workshop on Security and privacy in …, 2012 | 388 | 2012 |
Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS) S Egelman, E Peer Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015 | 379 | 2015 |
Facebook and Privacy: It’s Complicated M Johnson, S Egelman, SM Bellovin Symposium on Usable Privacy and Security (SOUPS), 2012 | 309 | 2012 |
Does my password go up to eleven?: the impact of password meters on password selection S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013 | 298 | 2013 |
Android Permissions Remystified: A Field Study on Contextual Integrity. P Wijesekera, A Baokar, A Hosseini, S Egelman, D Wagner, K Beznosov USENIX Security Symposium, 499-514, 2015 | 269 | 2015 |
It's no secret. measuring the security and reliability of authentication via “secret” questions S Schechter, AJB Brush, S Egelman 2009 30th IEEE Symposium on Security and Privacy, 375-390, 2009 | 251 | 2009 |
“Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale I Reyes, P Wijesekera, J Reardon, AEB On, A Razaghpanah, ... Proceedings on Privacy Enhancing Technologies 2018 (3), 63-83, 2018 | 245 | 2018 |
Choice architecture and smartphone privacy: There’s a price for that S Egelman, AP Felt, D Wagner The Economics of Information Security and Privacy, 211-236, 2013 | 221 | 2013 |
Are You Ready to Lock? S Egelman, S Jain, RS Portnoff, K Liao, S Consolvo, D Wagner Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 220 | 2014 |
50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System J Reardon, Á Feal, P Wijesekera, AEB On, N Vallina-Rodriguez, ... 28th {USENIX} Security Symposium ({USENIX} Security 19), 603-620, 2019 | 204 | 2019 |
Timing is everything?: the effects of timing and placement of online privacy indicators S Egelman, J Tsai, LF Cranor, A Acquisti Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009 | 204 | 2009 |
Privacy Attitudes of Smart Speaker Users N Malkin, J Deatrick, A Tong, P Wijesekera, S Egelman, D Wagner Proceedings on Privacy Enhancing Technologies 2019 (4), 250-271, 2019 | 187 | 2019 |
How to ask for permission AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner USENIX Workshop on Hot Topics in Security, 2012 | 187 | 2012 |
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences P Wijesekera, A Baokar, L Tsai, J Reardon, S Egelman, D Wagner, ... 2017 IEEE Symposium on Security and Privacy (SP), 1077-1093, 2017 | 182 | 2017 |