Ivan Flechais
Orcid: 0000-0002-3620-0843
According to our database1,
Ivan Flechais
authored at least 54 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Digital deception: generative artificial intelligence in social engineering and phishing.
Artif. Intell. Rev., December, 2024
Unpacking the Dynamics of Harm in Game Cheating Communities: A Guiding Framework for Cross-Industry Intervention.
Games Res. Pract., June, 2024
Useful shortcuts: Using design heuristics for consent and permission in smart home devices.
Int. J. Hum. Comput. Stud., February, 2024
"Innovative Technologies or Invasive Technologies?": Exploring Design Challenges of Privacy Protection With Smart Home in Jordan.
Proc. ACM Hum. Comput. Interact., 2024
Co-Designing a Mobile App for Bystander Privacy Protection in Jordanian Smart Homes: A Step Towards Addressing a Complex Privacy Landscape.
Proceedings of the 33rd USENIX Security Symposium, 2024
Beyond the Office Walls: Understanding Security and Shadow Security Behaviours in a Remote Work Context.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
2023
"It becomes more of an abstract idea, this privacy" - Informing the design for communal privacy experiences in smart homes.
Int. J. Hum. Comput. Stud., December, 2023
Examining Power Dynamics and User Privacy in Smart Technology Use Among Jordanian Households.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 New Security Paradigms Workshop, 2023
The Slippery Slope: Exploring the Parallels Between Game Cheating and Cybercrime Through Routine Activity Theory.
Proceedings of the APWG Symposium on Electronic Crime Research, 2023
2022
Data Protection at a Discount: Investigating the UX of Data Protection from User, Designer, and Business Leader Perspectives.
Proc. ACM Hum. Comput. Interact., 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
"It did not give me an option to decline": A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
"Alexa, Are You Spying on Me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020
"Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of Things.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
2019
Proceedings of the Halfway to the Future Symposium 2019, 2019
2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
2017
"If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It": A Study into Home Data Security Decisions.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
2016
Requir. Eng., 2016
2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
2014
Eliciting and visualising trust expectations using persona trust characteristics and goal models.
Proceedings of the 6th International Workshop on Social Software Engineering, 2014
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework.
Proceedings of the BCS-HCI 2014 Proceedings of the 28th International BCS Human Computer Interaction Conference, 2014
2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
2012
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
On the Design and Development of webinos: A Distributed Mobile Application Middleware.
Proceedings of the Distributed Applications and Interoperable Systems, 2012
2011
Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework.
Int. J. Secur. Softw. Eng., 2011
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Inf. Manag. Comput. Secur., 2010
Int. J. Secur. Softw. Eng., 2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Two heads are better than one: security and usability of device associations in group scenarios.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design.
Proceedings of the Human-Centred Software Engineering - Third International Conference, 2010
Proceedings of the South African Information Security Multi-Conference, 2010
Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010
Proceedings of the ARES 2010, 2010
2009
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science.
Int. J. Hum. Comput. Stud., 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009
2007
Int. J. Electron. Secur. Digit. Forensics, 2007
2005
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems.
Proceedings of the New Security Paradigms Workshop 2005, 2005
2003
Proceedings of the New Security Paradigms Workshop 2003, 2003