Follow
Kami Vaniea
Title
Cited by
Cited by
Year
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1882010
Betrayed by updates: how negative experiences affect future security
KE Vaniea, E Rader, R Wash
Proceedings of the SIGCHI conference on human factors in computing systems …, 2014
1662014
Tales of Software Updates: The process of updating software
K Vaniea, Y Rashidi
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2016
1422016
Real life challenges in access-control management
L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
1292009
Out of the loop: How automated software updates cause unintended security consequences
R Wash, E Rader, K Vaniea, M Rizor
10th Symposium On Usable Privacy and Security (SOUPS 2014), 89-104, 2014
1182014
A Survey on Developer-Centred Security
M Tahaei, K Vaniea
4th European Workshop on Usable Security, 2019
1132019
Understanding Privacy-Related Questions on Stack Overflow
M Tahaei, K Vaniea, N Saphra
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2020
972020
User-controllable security and privacy for pervasive computing
J Cornwell, I Fette, G Hsieh, M Prabaker, J Rao, K Tang, K Vaniea, ...
Eighth IEEE Workshop on Mobile Computing Systems and Applications, 14-19, 2007
922007
Lessons learned from the deployment of a smartphone-based access-control system
L Bauer, LF Cranor, MK Reiter, K Vaniea
Proceedings of the 3rd Symposium on Usable Privacy and Security, 64-75, 2007
852007
Privacy champions in software teams: Understanding their motivations, strategies, and challenges
M Tahaei, A Frik, K Vaniea
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
842021
Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing
F Mathis, JH Williamson, K Vaniea, M Khamis
ACM Transactions on Computer-Human Interaction (ToCHI) 28 (1), 1-44, 2021
832021
A user study of policy creation in a flexible access-control system
L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
762008
Was my message read? privacy and signaling on Facebook messenger
R Hoyle, S Das, A Kapadia, AJ Lee, K Vaniea
Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017
652017
Rubikauth: Fast and secure authentication in virtual reality
F Mathis, J Williamson, K Vaniea, M Khamis
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
642020
What is this URL's Destination? Empirical Evaluation of Users' URL Reading
SS Albakry, K Vaniea, M Wolters
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2020
642020
Debunking security-usability tradeoff myths
MA Sasse, M Smith, C Herley, H Lipford, K Vaniea
IEEE Security & Privacy 14 (5), 33-39, 2016
632016
Owning and Sharing: Privacy Perceptions of Smart Speaker Users
N Meng, D Keküllüoğlu, K Vaniea
Conference on Computer Supported Cooperative Work and Social Computing, 2021
562021
More than skin deep: measuring effects of the underlying model on access-control system usability
RW Reeder, L Bauer, LF Cranor, MK Reiter, K Vaniea
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
562011
I Don’t Need an Expert! Making URL Phishing Features Human Comprehensible
K Althobaiti, N Meng, K Vaniea
Conference on Human Factors in Computing Systems, 2021
532021
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems
F Mathis, K Vaniea, M Khamis
Proceedings of the 2021 chi conference on human factors in computing systems …, 2021
512021
The system can't perform the operation now. Try again later.
Articles 1–20