Author of the publication

Crying Wolf: An Empirical Study of SSL Warning Effectiveness.

, , , , and . USENIX Security Symposium, page 399-416. USENIX Association, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy patterns for online interactions, , , , and . Proceedings of the 2006 conference on Pattern languages of programs, page 1--9. Portland, Oregon, ACM, (2006)The architecture of robust publishing systems., , and . ACM Trans. Internet Techn., 1 (2): 199-230 (2001)"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab., , , , , , , and . SOUPS, page 123-140. USENIX Association, (2015)Diversify to Survive: Making Passwords Stronger with Adaptive Policies., , , , , , , , , and . SOUPS, page 1-12. USENIX Association, (2017)Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It., , , , and . SOUPS, page 105-111. USENIX Association, (2014)Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy?. Comput. Networks, 30 (1-7): 751-753 (1998)The post that wasn't: exploring self-censorship on facebook., , , , , and . CSCW, page 793-802. ACM, (2013)Mobile-app privacy nutrition labels missing key ingredients for success.. Commun. ACM, 65 (11): 26-28 (2022)Timing is everything?: the effects of timing and placement of online privacy indicators., , , and . CHI, page 319-328. ACM, (2009)Privacy critics: UI components to safeguard users' privacy., and . CHI Extended Abstracts, page 258-259. ACM, (1999)