Volgen
Jacob Abbott
Jacob Abbott
PhD Candidate of Informatics, Indiana University
Geverifieerd e-mailadres voor iu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
How Mandatory Second Factor Affects the Authentication User Experience
J Abbott, S Patil
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
242020
User-centered risk communication for safer browsing
S Das, J Abbott, S Gopavaram, J Blythe, LJ Camp
International Conference on Financial Cryptography and Data Security, 18-35, 2020
192020
Local standards for anonymization practices in health, wellness, accessibility, and aging research at CHI
J Abbott, H MacLeod, N Nurain, G Ekobe, S Patil
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
192019
CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication
LJ Camp, J Abbott, S Chen
2016 49th Hawaii International Conference on System Sciences (HICSS), 3656-3665, 2016
132016
Factors influencing password reuse: A case study
J Abbott, D Calarco, LJ Camp
Telecommunications Policy Research Conference on Communications, Information …, 2018
102018
The importance of social identity on password formulations
M Grobler, MAP Chamikara, J Abbott, JJ Jeong, S Nepal, C Paris
Personal and Ubiquitous Computing 25 (5), 813-827, 2021
92021
Password differences based on language and testing of memory recall
J Abbott, VM Garcia
NNGT Int. J. Inf. Security 2, 1-6, 2015
82015
Creen: A Carbon Footprint Calculator Designed for Calculation in Context
J Abbott, G Gao, P Shih
International Conference on Information, 769-776, 2019
52019
Small Data Privacy Protection: An Exploration of the Utility of Anonymized Data of People with Rare Diseases
H MacLeod, J Abbott, S Patil
Proceedings of the 2017 Workshop on Interactive Systems in Healthcare (WISH’17), 2017
32017
Identifying an Aurally Distinct Phrase Set for Text Entry Techniques
J Abbott, J Kaye, J Clawson
CHI Conference on Human Factors in Computing Systems, 1-13, 2022
12022
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home
J Abbott, J Dev, D Kim, S Gopavaram, M Iyer, S Sadam, S Mare, ...
2022 European Symposium on Usable Security, 98-110, 2022
2022
Building An Authentication Infrastructure—Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement
Z Zhang, J Abbott, LJ Camp
Available at SSRN 4177411, 2022
2022
Potential Reuse of University Credentials
A Bochner, J Abbott, LJ Camp
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–13