Author of the publication

Where is the Digital Divide?: A Survey of Security, Privacy, and Socioeconomics.

, , and . CHI, page 931-936. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effectiveness of Security Images in Internet Banking., , and . IEEE Internet Comput., 19 (1): 54-62 (2015)Equitable Security: Optimizing Distribution of Nudges and Resources., , , and . ACM Conference on Computer and Communications Security, page 2270-2272. ACM, (2018)How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior., , and . ACM Conference on Computer and Communications Security, page 666-677. ACM, (2016)Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers., , , , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities., , , , , and . USENIX Security Symposium, page 5647-5664. USENIX Association, (2023)Strategies and Perceived Risks of Sending Sensitive Documents., , , , and . USENIX Security Symposium, page 1217-1234. USENIX Association, (2021)An Observational Investigation of Reverse Engineers' Processes., , , , and . USENIX Security Symposium, page 1875-1892. USENIX Association, (2020)Exploring reactive access control., , , and . CHI Extended Abstracts, page 4417-4422. ACM, (2010)Of passwords and people: measuring the effect of password-composition policies., , , , , , , and . CHI, page 2595-2604. ACM, (2011)Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization., , , , , , and . CHI, page 493. ACM, (2018)