Blase Ur
Orcid: 0000-0001-9365-3155
According to our database1,
Blase Ur
authored at least 82 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads.
Proc. Priv. Enhancing Technol., 2024
Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
JupyterLab in Retrograde: Contextual Notifications That Highlight Fairness and Bias Issues for Data Scientists.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Analysis of Google Ads Settings Over Time: Updated, Individualized, Accurate, and Filtered.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords.
Proceedings of the 32nd USENIX Security Symposium, 2023
Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website's User Experience.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
CoRR, 2022
"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits.
Proceedings of the 31st USENIX Security Symposium, 2022
Summarizing Sets of Related ML-Driven Recommendations for Improving File Management in Cloud Storage.
Proceedings of the 35th Annual ACM Symposium on User Interface Software and Technology, 2022
Explaining Why: How Instructions and User Interfaces Impact Annotator Rationales When Labeling Text Data.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022
2021
Who Am I?: A Design Probe Exploring Real-Time Transparency about Online and Offline User Profiling Underlying Targeted Ads.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
"It's Stored, Hopefully, on an Encrypted Server": Mitigating Users' Misconceptions About FIDO2 Biometric WebAuthn.
Proceedings of the 30th USENIX Security Symposium, 2021
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, 2021
KondoCloud: Improving Information Management in Cloud Storage via Recommendations Based on File Similarity.
Proceedings of the UIST '21: The 34th Annual ACM Symposium on User Interface Software and Technology, 2021
Pursuing Usable and Useful Data Downloads Under GDPR/CCPA Access Rights via Co-Design.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming Authenticators.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Files of a Feather Flock Together? Measuring and Modeling How Users Perceive File Similarity in Cloud Storage.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Understanding Trigger-Action Programs Through Novel Visualizations of Program Differences.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data.
Proceedings of the 29th USENIX Security Symposium, 2020
An empirical study on the perceived fairness of realistic, imperfect machine learning models.
Proceedings of the FAT* '20: Conference on Fairness, 2020
Visualizing Differences to Improve End-User Understanding of Trigger-Action Programs.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
Taking Data Out of Context to Hyper-Personalize Ads: Crowdworkers' Privacy Perceptions and Decisions to Disclose Private Information.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the Human-Computer Interaction - INTERACT 2019, 2019
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Your Secrets Are Safe: How Browsers' Explanations Impact Misconceptions About Private Browsing Mode.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018
Proceedings of the Workshop on Human-In-the-Loop Data Analytics, 2018
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
ACM Trans. Inf. Syst. Secur., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
2014
Parents' and Teens' Perspectives on Privacy In a Technology-Filled World.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013
"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook.
Proceedings of the iConference 2012, Toronto, Ontario, Canada, February 7-10, 2012, 2012
Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
2011
Proceedings of the Human-Computer Interaction. Towards Mobile and Intelligent Interaction Environments, 2011