Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Älexa, Are You Spying on Me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users., and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 305-325. Springer, (2020)Examining Power Dynamics and User Privacy in Smart Technology Use Among Jordanian Households., and . USENIX Security Symposium, page 4643-4659. USENIX Association, (2023)Co-Designing a Mobile App for Bystander Privacy Protection in Jordanian Smart Homes: A Step Towards Addressing a Complex Privacy Landscape., and . USENIX Security Symposium, USENIX Association, (2024)"Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of Things., , and . EuroS&P Workshops, page 240-249. IEEE, (2020)"It did not give me an option to decline": A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products., , , and . CHI, page 555:1-555:16. ACM, (2021)Digital deception: generative artificial intelligence in social engineering and phishing., and . Artif. Intell. Rev., 57 (12): 324 (December 2024)Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras., , , and . SOUPS @ USENIX Security Symposium, page 185-204. USENIX Association, (2020)Unpacking the Dynamics of Harm in Game Cheating Communities: A Guiding Framework for Cross-Industry Intervention., , and . Games Res. Pract., 2 (2): 12:1-12:17 (June 2024)Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study., , , , and . CHI Extended Abstracts, page 1-9. ACM, (2020)Data Protection at a Discount: Investigating the UX of Data Protection from User, Designer, and Business Leader Perspectives., and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-36 (2022)