[ Publications about 'user studies' ]

Articles in journals or book chapters (3)
  1. Anne C. Tally, Jacob Abbott, Ashley Bochner, Sanchari Das, and Christena Nippert-Eng. What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions. Proc. ACM Hum.-Comput. Interact., 7(CSCW1), April 2023.
    Keywords: anti-phishing training, work context, organizations, user studies, IT departments, workplace, phishing, human factors, anti-phishing policy, security, organizational security. [bibtex-entry]

  2. Sanchari Das, Christena Nippert-Eng, and L Jean Camp. Evaluating user susceptibility to phishing attacks. Information & Computer Security, 30(1):1--18, 2022.
    Keywords: phishing, user studies. [bibtex-entry]

  3. Kay Connelly and L. Jean Camp. Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp). In Digital Privacy: Theory, Technologies and Practices eds, pages 332--348. Auerbach Publications, 2007.
    Keywords: Aging, Human-Centered Computing, user studies, Privacy, IoT. [bibtex-entry]

Conference publications (4)
  1. Vafa Andalibi, Erfan Sadeqi Azer, and L Jean Camp. Criteria and Analysis for Human-Centered Browser Fingerprinting Countermeasures. In Proceedings of the 55th Hawaii International Conference on System Sciences, 2022.
    Keywords: phishing, user studies, global resilience. [bibtex-entry]

  2. Peter J Caven, Shakthidhar Reddy Gopavaram, and L Jean Camp. Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making. In MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), pages 687--692, 2022. IEEE.
    Keywords: SBOM, user studies, behaviorial economics. [bibtex-entry]

  3. Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, and L Jean Camp. Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD). In Annual Computer Security Applications Conference, pages 337--348, 2021.
    Keywords: MUD, access control, IoT, user studies. [bibtex-entry]

  4. L. Jean Camp, Cathleen McGrath, and Alla Genkina. Security and Morality: A Tale of User Deceit. In , May 2006. Models of Trust for the Web MTW'06.
    Keywords: Mental Models, Human-Centered Computing, user studies. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House