[ Publications about 'human factors' ]
Articles in journals or book chapters (6) |
-
Anne C. Tally,
Jacob Abbott,
Ashley Bochner,
Sanchari Das,
and Christena Nippert-Eng.
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions.
Proc. ACM Hum.-Comput. Interact.,
7(CSCW1),
April 2023.
Keywords: anti-phishing training, work context, organizations, user studies, IT departments, workplace, phishing, human factors, anti-phishing policy, security, organizational security. [bibtex-entry] -
Jayati Dev.
Discussing Privacy and Surveillance on Twitter: A Case Study of COVID-19.
arXiv preprint arXiv:2006.06815,
2020.
Keywords: Privacy, Computational Social Science, Social Network Privacy, human factors, surveillance, internet governance. [bibtex-entry] -
Jayati Dev,
Emilee Rader,
and Sameer Patil.
Why Johnny Can’t Unsubscribe: Barriers to Stopping Unwanted Email.
2020.
Keywords: Privacy, Emails, User Study, human factors. [bibtex-entry] -
L. Jean Camp and Sanchari Das.
Studies of 2FA, Why Johnny Can’t Use 2FA and How We Can Change That?.
In .
Springer US,
March 2019.
Keywords: 2FA, authentication, human factors, usability. [bibtex-entry] -
Jayati Dev,
Sanchari Das,
and Kaushik Srinivasan.
Modularity is the Key: A New Approach to Social Media Privacy Policies.
2018.
Keywords: Privacy, Social Network Privacy, human factors, internet governance. [bibtex-entry] -
Sanchari Das,
Gianpaolo Russo,
Andrew C Dingman,
Jayati Dev,
Olivia Kenny,
and L Jean Camp.
A Qualitative Study on Usability and Acceptability of Yubico Security Key.
2017.
Keywords: Privacy, two-factor authentication, human factors. [bibtex-entry]
Conference publications (6) |
-
Anne Clara Tally,
Jacob Abbott,
Ashley M Bochner,
Sanchari Das,
and Christena Nippert-Eng.
Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees’ Current Practices.
In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems,
CHI '23,
New York, NY, USA,
2023.
Association for Computing Machinery.
Keywords: phishing education, cybersecurity, informal learning, guerrilla learning, phishing, workplace, anti-phishing training, organizations, IT departments, security, work context, organizational security, qualitative user studies, human factors. [bibtex-entry] -
Jayati Dev and L Jean Camp.
User Engagement with Chatbots: A Discursive Psychology Approach.
In Proceedings of the 2nd Conference on Conversational User Interfaces,
pages 1--4,
2020.
Keywords: AI, Social Network Privacy, human factors. [bibtex-entry] -
Jayati Dev,
Pablo Moriano,
and L Jean Camp.
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations.
In Sixteenth Symposium on Usable Privacy and Security (
\{ SOUPS\} 2020), pages 81--97, 2020.
Keywords: Privacy, International, Social Network Privacy, human factors. [bibtex-entry] -
Sanchari Das,
Jayati Dev,
and Kaushik Srinivasan.
Modularity is the Key: A New Approach to Social Media Privacy Policies.
In ACM,
2018.
MEXIHC 2018.
Keywords: Privacy, Social Network Privacy, human factors, internet governance. [bibtex-entry] -
Jayati Dev,
Sanchari Das,
and L Jean Camp.
Understanding privacy concerns of whatsapp users in India: poster.
In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security,
pages 28,
2018.
ACM.
Keywords: Privacy, Cultural, Social Network Privacy, human factors. [bibtex-entry] -
Jayati Dev,
Sanchari Das,
and L Jean Camp.
Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India.
In Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018),
pages 135,
2018.
Lulu. com.
Keywords: Privacy, Cultural, Social Network Privacy, human factors. [bibtex-entry]
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House