[ Publications about 'security' ]

Articles in journals or book chapters (3)
  1. Anne C. Tally, Jacob Abbott, Ashley Bochner, Sanchari Das, and Christena Nippert-Eng. What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions. Proc. ACM Hum.-Comput. Interact., 7(CSCW1), April 2023.
    Keywords: anti-phishing training, work context, organizations, user studies, IT departments, workplace, phishing, human factors, anti-phishing policy, security, organizational security. [bibtex-entry]

  2. Marthie Grobler, M.A.P. Chamikara, Jacob Abbott, Surya Nepal, and Cecil Paris. The Importance of Social Identity on Password Formulation. Personal and Ubiquitous Computing, November 2020.
    Keywords: Passwords, Security, Privacy, International, Authentication. [bibtex-entry]

  3. Jacob Abbott and Violeta Moreno Garcia. Password differences based on language and testing of memory recall. NNGT International Journal of Information Security, 2:1--6, 2015.
    Keywords: Passwords, Security, Usability, Authentication, International. [bibtex-entry]

Conference publications (14)
  1. Jacob Abbott, Jayati Dev, DongInn Kim, Shakthidhar Reddy Gopavaram, Meera Iyer, Shivani Sadam, Shirang Mare, Tatiana Ringenberg, Vafa Andalibi, and L. Jean Camp. Kids, Cats, and Control: Designing Privacy and Security Dashboards for IoT Home Devices. In Proceedings of the Symposium on Usable Security and Privacy (USEC) 2023, USEC '23, San Diego, CA, USA, 2023.
    Keywords: Security, user interviews, smart home, IoT. [bibtex-entry]

  2. Anne Clara Tally, Jacob Abbott, Ashley M Bochner, Sanchari Das, and Christena Nippert-Eng. Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees’ Current Practices. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI '23, New York, NY, USA, 2023. Association for Computing Machinery.
    Keywords: phishing education, cybersecurity, informal learning, guerrilla learning, phishing, workplace, anti-phishing training, organizations, IT departments, security, work context, organizational security, qualitative user studies, human factors. [bibtex-entry]

  3. Dalyapraz Manatova, Inna Kouper, and Sagar Samtani. Designing a Vulnerability Management Dashboard to Enhance Security Analysts’ Decision Making Processes. In Practice and Experience in Advanced Research Computing, PEARC '22, New York, NY, USA, pages 1--4, July 2022. Association for Computing Machinery.
    Keywords: network security visualizations, security visualizations, Vulnerability management. [Abstract] [bibtex-entry]

  4. Jacob Abbott, Jayati Dev, Donginn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana Ringenberg, Vafa Andalibi, and L. Jean Camp. Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home. In Proceedings of the 2022 European Symposium on Usable Security, EuroUSEC '22, New York, NY, USA, pages 98–110, 2022. Association for Computing Machinery.
    Keywords: Security, user interviews, smart home, IoT, 2FA, privacy. [bibtex-entry]

  5. Zitao Zhang, Jacob Abbott, Sanchari Das, and L. Jean Camp. Building an Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement. In TPRC 2022: The 50th Research Conference on Communication, Information and Internet Policy, 2022. Social Science Research Network.
    Keywords: Security, UX, 2FA. [bibtex-entry]

  6. Jacob Abbott and Sameer Patil. How Mandatory Second Factor Affects the Authentication User Experience. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI ’20, New York, NY, USA, pages 1–13, 2020. Association for Computing Machinery.
    Keywords: Security, UX, 2FA. [bibtex-entry]

  7. Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, and L Jean Camp. User-Centered Risk Communication for Safer Browsing. In Proceedings of the First Asia USEC-Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security, 2020.
    Keywords: Phishing, Risk Communication, Privacy, Security. [bibtex-entry]

  8. L. Jean Camp, Jacob Abbott, and Siyu Chen. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 3656--3665, January 2016. IEEE.
    Keywords: Security, Passwords, Usability, Authentication. [bibtex-entry]

  9. Aarathi Prasad, Ronald Peterson, Shrirang Mare, Jacob Sorber, Kolin Paul, and David Kotz. Provenance framework for mHealth. In Proceedings of the Workshop on Networked Healthcare Technology (NetHealth), January 2013.
    Keywords: mhealth, privacy, security, wearable. [bibtex-entry]

  10. Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz. Passive Biometrics for Pervasive Wearable Devices (Poster paper). In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2012.
    Keywords: authentication, security, sensors, wearable. [bibtex-entry]

  11. Jacob Sorber, Minho Shin, Ronald Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, and David Kotz. An Amulet for Trustworthy Wearable mhealth. In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2012.
    Keywords: ists, mhealth, privacy, project-amulet, security, sensors, wearable. [bibtex-entry]

  12. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. design for privacy, mhealth. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), October 2011.
    Keywords: ists, mhealth, privacy, security, wearable, wifi. [bibtex-entry]

  13. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Adaptive security and privacy for mHealth sensing. In Proceedings of the USENIX Workshop on Health Security (HealthSec), August 2011.
    Note: Short paper.
    Keywords: mhealth, position, privacy, security, wearable, wifi. [bibtex-entry]

  14. Shrirang Mare and David Kotz. Is Bluetooth the right technology for mHealth?. In Proceedings of the USENIX Workshop on Health Security (HealthSec), August 2010.
    Note: Position paper.
    Keywords: mhealth, position, security. [bibtex-entry]

Internal reports (2)
  1. Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz. Vocal resonance as a biometric for pervasive wearable devices. Technical report TR2014-747, Dartmouth Computer Science, February 2014.
    Keywords: authentication, security, sensors, wearable. [bibtex-entry]

  2. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Hide-n-Sense: Privacy-aware secure mHealth sensing. Technical report TR2011-702, Dartmouth Computer Science, September 2011.
    Keywords: ignore, mhealth, privacy, security, wearable, wifi. [bibtex-entry]

Posters and Presentations (5)
  1. L. Jean Camp Ashley Bochner, Jacob Abbott. Potential Reuse of University Credentials. Poster at the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), August 2021.
    Keywords: Passwords, Security, Authentication. [bibtex-entry]

  2. Jeremy Gummeson, Mary Baker, Animesh Srivastava, and Shrirang Mare. Controlling devices based on collocation of the devices on a user. U.S. Patent 10,331,916, June 2019.
    Keywords: authentication, mhealth, patent, security, sensors, wearable. [bibtex-entry]

  3. Andr?s D. Molina-Markham, Shrirang Mare, Ronald Peterson, Jr., and David Kotz. Continuous seamless mobile device authentication using a separate electronic wearable apparatus. U.S. Patent 9,961,547, May 2018.
    Keywords: authentication, mhealth, patent, security, sensors, wearable. [bibtex-entry]

  4. David Kotz, Ryan Halter, Cory Cornelius, Jacob Sorber, Minho Shin, Ronald Peterson, Shrirang Mare, Aarathi Prasad, Joseph Skinner, and Andr?s Molina-Markham. Wearable computing device for secure control of physiological sensors and medical devices, with secure storage of medical records, and bioimpedance biometric. U.S. Patent 9,936,877; International Patent Application WO2013096954A1, April 2018.
    Keywords: ctbh, ists, mhealth, patent, project-amulet, security, sensors, wearable. [bibtex-entry]

  5. Shrirang Mare, Andr?s Molina-Markham, Ronald Peterson, and David Kotz. System, method and authorization device for biometric access control to digital devices. U.S. Patent 9,832,206; International Patent Application WO2014153528A2, November 2017.
    Keywords: authentication, mhealth, patent, security, sensors, wearable. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House