Kami Vaniea
Kami Vaniea
The University of Edinburgh School of Informatics
Geverifieerd e-mailadres voor inf.ed.ac.uk - Homepage
TitelGeciteerd doorJaar
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1282010
User-controllable security and privacy for pervasive computing
J Cornwell, I Fette, G Hsieh, M Prabaker, J Rao, K Tang, K Vaniea, ...
Eighth IEEE Workshop on Mobile Computing Systems and Applications, 14-19, 2007
802007
Betrayed by updates: how negative experiences affect future security
KE Vaniea, E Rader, R Wash
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
722014
Real life challenges in access-control management
L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
722009
Lessons learned from the deployment of a smartphone-based access-control system
L Bauer, LF Cranor, MK Reiter, K Vaniea
Proceedings of the 3rd Symposium on Usable Privacy and Security, 64-75, 2007
712007
A user study of policy creation in a flexible access-control system
L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
642008
Out of the loop: How automated software updates cause unintended security consequences
R Wash, E Rader, K Vaniea, M Rizor
10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 89-104, 2014
452014
More than skin deep: measuring effects of the underlying model on access-control system usability
RW Reeder, L Bauer, LF Cranor, MK Reiter, K Vaniea
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
362011
Tales of Software Updates: The process of updating software
K Vaniea, Y Rashidi
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2016
302016
Out of sight, out of mind: Effects of displaying access-control information near the item it controls
K Vaniea, L Bauer, LF Cranor, MK Reiter
2012 Tenth Annual International Conference on Privacy, Security and Trust …, 2012
252012
Evaluating assistance of natural language policy authoring
K Vaniea, CM Karat, JB Gross, J Karat, C Brodie
Proceedings of the 4th symposium on Usable privacy and security, 65-73, 2008
212008
Access control policy analysis and visualization tools for security professionals
K Vaniea, Q Ni, L Cranor, E Bertino
SOUPS Workshop (USM), 2008
202008
Debunking security-usability tradeoff myths
MA Sasse, M Smith, C Herley, H Lipford, K Vaniea
IEEE Security & Privacy 14 (5), 33-39, 2016
172016
Was my message read?: Privacy and Signaling on Facebook Messenger
R Hoyle, S Das, A Kapadia, AJ Lee, K Vaniea
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
122017
Understanding Saudis’ privacy concerns when using WhatsApp
Y Rashidi, K Vaniea, LJ Camp
Proceedings of the Workshop on Usable Security (USEC’16), 2016
122016
Comparing access-control technologies: A study of keys and smartphones
L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea
82007
Functionality for sharing items using recipient-specific access codes
SE Schechter, KE Vaniea, A Forget
US Patent 8,930,469, 2015
72015
Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks
R Hoyle, S Das, A Kapadia, AJ Lee, K Vaniea
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative …, 2017
62017
Factors related to privacy concerns and protection behaviors regarding behavioral advertising
DY Wohn, J Solomon, D Sarkar, KE Vaniea
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human …, 2015
62015
Effects of access-control policy conflict-resolution methods on policy-authoring usability
RW Reeder, L Bauer, LF Cranor, MK Reiter, K Vaniea
CyLab, 12, 2009
62009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20