How Mandatory Second Factor Affects the Authentication User Experience J Abbott, S Patil Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 47 | 2020 |
Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI J Abbott, H MacLeod, N Nurain, G Ekobe, S Patil Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 34 | 2019 |
User-Centered Risk Communication for Safer Browsing S Das, J Abbott, S Gopavaram, J Blythe, LJ Camp Proceedings of the First Asia USEC-Workshop on Usable Security, In …, 2020 | 22 | 2020 |
The importance of social identity on password formulations M Grobler, MAP Chamikara, J Abbott, JJ Jeong, S Nepal, C Paris Personal and Ubiquitous Computing 25 (5), 813-827, 2021 | 16 | 2021 |
CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication LJ Camp, J Abbott, S Chen 2016 49th Hawaii International Conference on System Sciences (HICSS), 3656-3665, 2016 | 14 | 2016 |
Factors Influencing Password Reuse: A Case Study J Abbott, D Calarco, LJ Camp TPRC, 2018 | 12 | 2018 |
Password differences based on language and testing of memory recall J Abbott, VM Garcia NNGT Int. J. Inf. Secur. 2, 1-6, 2015 | 10 | 2015 |
Creen: a carbon footprint calculator designed for calculation in context J Abbott, G Gao, P Shih International Conference on Information, 769-776, 2019 | 7 | 2019 |
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions AC Tally, J Abbott, A Bochner, S Das, C Nippert-Eng Proceedings of the ACM on Human-Computer Interaction 7 (CSCW1), 1-27, 2023 | 5 | 2023 |
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home J Abbott, J Dev, D Kim, S Gopavaram, M Iyer, S Sadam, S Mare, ... Proceedings of the 2022 European Symposium on Usable Security, 98-110, 2022 | 5 | 2022 |
Identifying an aurally distinct phrase set for text entry techniques J Abbott, J Kaye, J Clawson Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022 | 3 | 2022 |
Small Data Privacy Protection: An Exploration of the Utility of Anonymized Data of People with Rare Diseases H MacLeod, J Abbott, S Patil roceedings of the 2017 Workshop on Interactive Systems in Healthcare (WISH’17), 2017 | 3 | 2017 |
Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees’ Current Practices AC Tally, J Abbott, AM Bochner, S Das, C Nippert-Eng Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023 | 2 | 2023 |
Building An Authentication Infrastructure—Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement Z Zhang, J Abbott, LJ Camp Available at SSRN 4177411, 2022 | 2 | 2022 |
Kids, Cats, and Control: Designing Privacy and Security Dashboards for IoT Home Devices J Abbott, J Dev, DI Kim, SR Gopavaram, M Iyer, S Sadam, S Mare, ... Symposium on Usable Security and Privacy (USEC) 2023, 2023 | 1 | 2023 |
Potential Reuse of University Credentials A Bochner, J Abbott, LJ Camp Poster at the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 2021 | 1 | 2021 |