暂无分享,去创建一个
L. Jean Camp | Yang Wang | Prashanth Rajivan | Rod D. Roscoe | Robert S. Gutzwiller | Sanchari Das | L. J. Camp | Roberto Hoyle | R. Gutzwiller | P. Rajivan | Sanchari Das | Roberto Hoyle | Yang Wang
[1] Ada Lerner,et al. Privacy and Activism in the Transgender Community , 2020, CHI.
[2] L. J. Camp,et al. User-Centered Risk Communication for Safer Browsing , 2020, Financial Cryptography Workshops.
[3] Cleotilde Gonzalez,et al. Opportunities and Challenges for Human-Machine Teaming in Cybersecurity Operations , 2019 .
[4] Kylie M. Gomes,et al. HFE in Diversity, Inclusion and Social Justice: A Practical Primer , 2019, Proceedings of the Human Factors and Ergonomics Society Annual Meeting.
[5] D. Cosley,et al. Panel: Research Sponsors for Cybersecurity Research and the Human Factor , 2019, Proceedings of the Human Factors and Ergonomics Society Annual Meeting.
[6] Erin K. Chiou,et al. Advancing Diversity, Inclusion, and Social Justice Through Human Systems Engineering , 2019 .
[7] L. Jean Camp,et al. Evaluating User Perception of Multi-Factor Authentication: A Systematic Review , 2019, HAISA.
[8] Christena Nippert-Eng,et al. All About Phishing: Exploring User Research through a Systematic Literature Review , 2019, HAISA.
[9] L. Jean Camp,et al. Personalized WhatsApp Privacy: Demographic and Cultural Influences on Indian and Saudi Users , 2019, SSRN Electronic Journal.
[10] Lawrie Brown,et al. Computer Security: Principles and Practice , 2007 .
[11] Sanchari Das. Towards Implementing Inclusive Authentication Technologies for Older Adults , 2019 .
[12] Sanchari Das,et al. Modularity is the Key A New Approach to Social Media Privacy Policies , 2018, MexIHC.
[13] Rupa S. Valdez,et al. Human Factors and Ergonomics in Diversity, Inclusion and Social Justice Research , 2018, Proceedings of the Human Factors and Ergonomics Society Annual Meeting.
[14] Yang Wang,et al. Inclusive Security and Privacy , 2018, IEEE Security & Privacy.
[15] L. Jean Camp,et al. Poster Abstract: Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears , 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI).
[16] L. Jean Camp,et al. Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key , 2018, Financial Cryptography.
[17] Erin K. Chiou,et al. The HFES Diversity Committee: Challenges and Opportunities for Involvement , 2017 .
[18] L. Jean Camp,et al. Factors in an end user security expertise instrument , 2017, Inf. Comput. Secur..
[19] Pamela Briggs,et al. An Inclusive, Value Sensitive Design Perspective on Future Identity Technologies , 2015, TCHI.
[20] P. Hancock,et al. The Human Factors of Cyber Network Defense , 2015 .
[21] A. Acquisti,et al. The More Social Cues, The Less Trolling? An Empirical Study of Online Commenting Behavior , 2013 .
[22] Alan Borning,et al. Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.
[23] M. Angela Sasse,et al. Why Trust Seals Don't Work: A Study of User Perceptions and Behavior , 2012, TRUST.
[24] L. Jean Camp,et al. DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home , 2011, Journal of Medical Systems.
[25] Krzysztof Z. Gajos,et al. Ability-Based Design: Concept, Principles and Examples , 2011, TACC.
[26] A. Alavi,et al. Opportunities and Challenges , 1998, In Vitro Diagnostic Industry in China.