[ Publications of Jacob Abbott ]
Articles in journals or book chapters (3) |
-
Anne C. Tally,
Jacob Abbott,
Ashley Bochner,
Sanchari Das,
and Christena Nippert-Eng.
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions.
Proc. ACM Hum.-Comput. Interact.,
7(CSCW1),
April 2023.
Keywords: anti-phishing training, work context, organizations, user studies, IT departments, workplace, phishing, human factors, anti-phishing policy, security, organizational security. [bibtex-entry] -
Marthie Grobler,
M.A.P. Chamikara,
Jacob Abbott,
Surya Nepal,
and Cecil Paris.
The Importance of Social Identity on Password Formulation.
Personal and Ubiquitous Computing,
November 2020.
Keywords: Passwords, Security, Privacy, International, Authentication. [bibtex-entry] -
Jacob Abbott and Violeta Moreno Garcia.
Password differences based on language and testing of memory recall.
NNGT International Journal of Information Security,
2:1--6,
2015.
Keywords: Passwords, Security, Usability, Authentication, International. [bibtex-entry]
Conference publications (13) |
- Peter Caven, Zitao Zhang, Jacob Abbott, Xinyao Ma, and L Jean Camp. Comparing the Use and Usefulness of Four IoT Security Labels. In Proceedings of the CHI Conference on Human Factors in Computing Systems, pages 1--31, 2024. [bibtex-entry]
-
Jacob Abbott,
Jayati Dev,
DongInn Kim,
Shakthidhar Reddy Gopavaram,
Meera Iyer,
Shivani Sadam,
Shirang Mare,
Tatiana Ringenberg,
Vafa Andalibi,
and L. Jean Camp.
Kids, Cats, and Control: Designing Privacy and Security Dashboards for IoT Home Devices.
In Proceedings of the Symposium on Usable Security and Privacy (USEC) 2023,
USEC '23,
San Diego, CA, USA,
2023.
Keywords: Security, user interviews, smart home, IoT. [bibtex-entry] -
Anne Clara Tally,
Jacob Abbott,
Ashley M Bochner,
Sanchari Das,
and Christena Nippert-Eng.
Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees’ Current Practices.
In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems,
CHI '23,
New York, NY, USA,
2023.
Association for Computing Machinery.
Keywords: phishing education, cybersecurity, informal learning, guerrilla learning, phishing, workplace, anti-phishing training, organizations, IT departments, security, work context, organizational security, qualitative user studies, human factors. [bibtex-entry] -
Jacob Abbott,
Jayati Dev,
Donginn Kim,
Shakthidhar Gopavaram,
Meera Iyer,
Shivani Sadam,
Shrirang Mare,
Tatiana Ringenberg,
Vafa Andalibi,
and L. Jean Camp.
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home.
In Proceedings of the 2022 European Symposium on Usable Security,
EuroUSEC '22,
New York, NY, USA,
pages 98–110,
2022.
Association for Computing Machinery.
Keywords: Security, user interviews, smart home, IoT, 2FA, privacy. [bibtex-entry] -
Jacob Abbott,
Jofish Kaye,
and James Clawson.
Identifying an Aurally Distinct Phrase Set for Text Entry Techniques.
In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems,
CHI '22,
New York, NY, USA,
2022.
Association for Computing Machinery.
Keywords: text-to-speech, accessibility, text entry, TTS, synthesized speech, input techniques. [Abstract] [bibtex-entry] -
Zitao Zhang,
Jacob Abbott,
Sanchari Das,
and L. Jean Camp.
Building an Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement.
In TPRC 2022: The 50th Research Conference on Communication, Information and Internet Policy,
2022.
Social Science Research Network.
Keywords: Security, UX, 2FA. [bibtex-entry] -
Jacob Abbott and Sameer Patil.
How Mandatory Second Factor Affects the Authentication User Experience.
In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems,
CHI ’20,
New York, NY, USA,
pages 1–13,
2020.
Association for Computing Machinery.
Keywords: Security, UX, 2FA. [bibtex-entry] -
Sanchari Das,
Jacob Abbott,
Shakthidhar Gopavaram,
Jim Blythe,
and L Jean Camp.
User-Centered Risk Communication for Safer Browsing.
In Proceedings of the First Asia USEC-Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security,
2020.
Keywords: Phishing, Risk Communication, Privacy, Security. [bibtex-entry] -
Jacob Abbott,
Gege Gao,
and Patrick Shih.
Creen: A Carbon Footprint Calculator Designed for Calculation in Context.
In International Conference on Information,
pages 769--776,
2019.
Springer.
Keywords: Sustainability, IoT, HCI. [bibtex-entry] -
Jacob Abbott,
Novia Nurain Haley MacLeod,
Gustave Ekobe,
and Sameer Patil.
Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI.
In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems,
2019.
ACM.
Keywords: Health, Privacy, Anonymization. [bibtex-entry] -
Jacob Abbott,
Daniel Calarco,
and L Jean Camp.
Factors Influencing Password Reuse: A Case Study.
In TPRC46: Research Conference on Communications, Information and Internet Policy,
September 2018.
TPRC.
Keywords: Passwords, Policies. [bibtex-entry] -
Haley MacLeod,
Jacob Abbott,
and Sameer Patil.
Small Data Privacy Protection: An Exploration of the Utility of Anonymized Data of People with Rare Diseases.
In Proceedings of the 2017 Workshop on Interactive Systems in Healthcare (WISH’17),
2017.
Keywords: Privacy, Health, Anonymization. [bibtex-entry] -
L. Jean Camp,
Jacob Abbott,
and Siyu Chen.
CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication.
In 2016 49th Hawaii International Conference on System Sciences (HICSS),
pages 3656--3665,
January 2016.
IEEE.
Keywords: Security, Passwords, Usability, Authentication. [bibtex-entry]
Posters and Presentations (1) |
-
Jacob Abbott,
Violeta Moreno,
and L. Jean Camp.
Password Differences based on Language and Testing of Memory Recall.
Annual Computer Security Applications Conference, (New Oleans, LA),
December 2014.
Keywords: Passwords, Usability, User Study. [bibtex-entry]
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House