Sonia Chiasson

Orcid: 0000-0001-7314-2198

According to our database1, Sonia Chiasson authored at least 99 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Influences of displaying permission-related information on web single sign-on login decisions.
Comput. Secur., 2024

2023
Security and Privacy Perceptions of Mental Health Chatbots.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

"A Solution to a Problem that Didn't Exist?": Exploring Attitudes Towards Smart Streetlight Systems.
Proceedings of the Human-Computer Interaction - INTERACT 2023 - 19th IFIP TC13 International Conference, York, UK, August 28, 2023

"It's not that I want to see the student's bedroom...": Instructor Perceptions of e-Proctoring Software.
Proceedings of the 2023 European Symposium on Usable Security, 2023

A comparison of users' and non-users' perceptions of health and ancestry at-home DNA testing.
Proceedings of the 2023 European Symposium on Usable Security, 2023

2022
Privacy and Safety on Social Networking Sites: Autistic and Non-Autistic Teenagers' Attitudes and Behaviors.
ACM Trans. Comput. Hum. Interact., 2022

A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education.
ACM Comput. Surv., 2022

SSOPrivateEye: Timely Disclosure of Single Sign-On Privacy Design Differences.
CoRR, 2022

Understanding individual differences: factors affecting secure computer behaviour.
Behav. Inf. Technol., 2022

How Well Do Experts Understand End-Users' Perceptions of Manipulative Patterns?
Proceedings of the NordiCHI '22: Nordic Human-Computer Interaction Conference, Aarhus, Denmark, October 8, 2022

Users, Smart Homes, and Digital Assistants: Impact of Technology Experience and Adoption.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

"I just want to play games with friends and it asked me for all of my information": Trading privacy for connection during the COVID-19 pandemic.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

2021
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens.
ACM Trans. Priv. Secur., 2021

Exploring Privacy Implications in OAuth Deployments.
CoRR, 2021

Empirical Analysis and Privacy Implications in OAuth-based Single Sign-On Systems.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

"Whether it's moral is a whole other story": Consumer perspectives on privacy regulations and corporate data practices.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

"I'm Literally Just Hoping This Will Work: " Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Replication: Effects of Media on the Mental Models of Technical Users.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

"It's So Difficult to Sever that Connection": The Role of FoMO in Users' Reluctant Privacy Behaviours.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

"They think it's totally fine to talk to somebody on the internet they don't know": Teachers' perceptions and mitigation strategies of tweens' online risks.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

"I'm Not a Millionaire": How Users' Online Behaviours and Offline Behaviours Impact Their Privacy.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols.
IACR Cryptol. ePrint Arch., 2020

The Influence of Decaying the Representation of Older Social Media Content on Simulated Hiring Decisions.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

'Lime', 'Open Lock', and 'Blocked': Children's Perception of Colors, Symbols, and Words in Cybersecurity Warnings.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Understanding Fitness Tracker Users' Security and Privacy Knowledge, Attitudes and Behaviours.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

"I'm hoping they're an ethical company that won't do anything that I'll regret": Users Perceptions of At-home DNA Testing Companies.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Mixed Pictures: Mental Models of Malware.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

End-Users and Service Providers: Trust and Distributed Responsibility for Account Security.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

Control and Understanding in Malware and Legitimate Software.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

<i>'Think secure from the beginning'</i>: A Survey with Software Developers.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach.
ACM Trans. Priv. Secur., 2018

Privacy Concerns Amidst OBA and the Need for Alternative Models.
IEEE Internet Comput., 2018

An exploration of graphical password authentication for children.
Int. J. Child Comput. Interact., 2018

The aftermath of a crypto-ransomware attack at a large academic institution.
Proceedings of the 27th USENIX Security Symposium, 2018

Online Privacy and Aging of Digital Artifacts.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Security in the Software Development Lifecycle.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Exploring the Impact of Colour-Blindness on Computer Game Performance.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A day in the life of jos: a web-based game to increase children's digital literacy.
Proceedings of the 17th ACM Conference on Interaction Design and Children, 2018

An exploratory study of children's online password behaviours.
Proceedings of the 17th ACM Conference on Interaction Design and Children, 2018

2017
Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy.
Int. J. Child Comput. Interact., 2017

When private and professional lives meet: The impact of digital footprints on employees and political candidates.
Proceedings of the 8th International Conference on Social Media & Society, 2017

Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

No passwords needed: the iterative design of a parent-child authentication mechanism.
Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2017

Cyberheroes: an interactive ebook for improving children's online privacy.
Proceedings of the HCI 2017, 2017

Secure comics: an interactive comic series for improving cyber security and privacy.
Proceedings of the HCI 2017, 2017

Engaging Children About Online Privacy Through Storytelling in an Interactive Comic.
Proceedings of the HCI 2017, 2017

2016
Bend Passwords: using gestures to authenticate on flexible devices.
Pers. Ubiquitous Comput., 2016

The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity.
Int. J. Hum. Comput. Interact., 2016

Cesar: Visual representation of source code vulnerabilities.
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016

Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

Revisiting password rules: facilitating human management of passwords.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

"Smells Phishy?": An educational game about online phishing scams.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

An Eye-tracking Evaluation of Driver Distraction and Unfamiliar Road Signs.
Proceedings of the 8th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2016

From Nosy Little Brothers to Stranger-Danger: Children and Parents' Perception of Mobile Threats.
Proceedings of the The 15th International Conference on Interaction Design and Children, 2016

Teaching with an Interactive E-book to Improve Children's Online Privacy Knowledge.
Proceedings of the The 15th International Conference on Interaction Design and Children, 2016

2015
User-centred authentication feature framework.
Inf. Comput. Secur., 2015

Why phishing still works: User strategies for combating phishing attacks.
Int. J. Hum. Comput. Stud., 2015

Quantifying the security advantage of password expiration policies.
Des. Codes Cryptogr., 2015

User Perceptions of Sharing, Advertising, and Tracking.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Choose Your Own Authentication.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

What's the deal with privacy apps?: a comprehensive exploration of user perception and usability.
Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, Linz, Austria, November 30, 2015

Heuristics for the evaluation of captchas on smartphones.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015

2014
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion.
IEEE Trans. Dependable Secur. Comput., 2014

Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices.
Int. J. Mob. Hum. Comput. Interact., 2014

Stop Clicking on "Update Later": Persuading Users They Need Up-to-Date Antivirus Protection.
Proceedings of the Persuasive Technology - 9th International Conference, 2014

2013
The Usability of CAPTCHAs on Smartphones.
Proceedings of the SECRYPT 2013, 2013

Writing down your password: Does it help?
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

U-PriSM 2: the second usable privacy and security for mobile devices workshop.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Improving user authentication on mobile devices: a touchscreen graphical password.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Password advice shouldn't be boring: Visualizing password guessing attacks.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

Passwords on flexible display devices.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

A clinical study of risk factors related to malware infections.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism.
IEEE Trans. Dependable Secur. Comput., 2012

Graphical passwords: Learning from the first twelve years.
ACM Comput. Surv., 2012

Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Methodology for a Field Study of Anti-malware Software.
Proceedings of the Financial Cryptography and Data Security, 2012

It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Proceedings of the Financial Cryptography and Data Security, 2012

The MVP Web-Based Authentication Framework - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

Does context influence responses to firewall warnings?
Proceedings of the 2012 eCrime Researchers Summit, 2012

Tapas: design, implementation, and usability evaluation of a password manager.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2010
Input precision for gaze-based graphical passwords.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Exploring usability effects of increasing security in click-based graphical passwords.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
User interface design affects security: patterns in click-based graphical passwords.
Int. J. Inf. Sec., 2009

Lessons from brain age on persuasion for computer security.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Multiple password interference in text passwords and click-based graphical passwords.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Improving text passwords through persuasion.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Persuasion for Stronger Passwords: Motivation and Pilot Study.
Proceedings of the Persuasive Technology, Third International Conference, 2008

Centered Discretization with Application to Graphical Passwords.
Proceedings of the Usability, Psychology, and Security, 2008

Lessons from Brain Age on password memorability.
Proceedings of the 2008 Conference on Future Play: Research, Play, Share, 2008

Influencing users towards better passwords: persuasive cued click-points.
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008

2007
Helping users create better passwords: is this the right approach?
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

A second look at the usability of click-based graphical passwords.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

CASE-FX: feature modeling support in an OO Case tool.
Proceedings of the Companion to the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007

Graphical Password Authentication Using Cued Click Points.
Proceedings of the Computer Security, 2007

2006
A Usability Study and Critique of Two Password Managers.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

2005
Testing the media equation with children.
Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005


  Loading...