Kami Vaniea
Orcid: 0000-0001-8042-3342Affiliations:
- University of Waterloo, Ontario, Canada
- University of Edinburgh, UK (former)
According to our database1,
Kami Vaniea
authored at least 54 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
1
4
3
3
1
1
1
2
7
7
6
3
1
2
1
1
2
1
1
1
1
2
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on inf.ed.ac.uk
-
on vaniea.com
-
on orkg.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Phishing Codebook: A Structured Framework for the Characterization of Phishing Emails.
CoRR, 2024
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proc. ACM Hum. Comput. Interact., April, 2023
IEEE Secur. Priv., 2023
To Patch, or not To Patch? That is the Question: A Case Study of System Administrators' Online Collaborative Behaviour.
CoRR, 2023
IEEE Access, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Multi-User Smart Speakers - A Narrative Review of Concerns and Problematic Interactions.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Int. J. Hum. Comput. Interact., 2022
CoRR, 2022
Can I Borrow Your ATM? Using Virtual Reality for (Simulated) In Situ Authentication Research.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2022
Virtual Reality Observations: Using Virtual Reality to Augment Lab-Based Shoulder Surfing Research.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2022
From an Authentication Question to a Public Social Event: Characterizing Birthday Sharing on Twitter.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Recruiting Participants With Programming Skills: A Comparison of Four Crowdsourcing Platforms and a CS Student Mailing List.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022
Stay Home! Conducting Remote Usability Evaluations of Novel Real-World Authentication Systems Using Virtual Reality.
Proceedings of the AVI 2022: International Conference on Advanced Visual Interfaces, Frascati, Rome, Italy, June 6, 2022
2021
Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing.
ACM Trans. Comput. Hum. Interact., 2021
Proc. ACM Hum. Comput. Interact., 2021
Proc. ACM Hum. Comput. Interact., 2021
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Observing Virtual Avatars: The Impact of Avatars' Fidelity on Identifying Interactions.
Proceedings of the Mindtrek '21: Academic Mindtrek 2021, 2021
Security Notifications in Static Analysis Tools: Developers' Attitudes, Comprehension, and Ability to Act on Them.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
RepliCueAuth: Validating the Use of a Lab-Based Virtual Reality Setup for Evaluating Authentication Systems.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
Proceedings of the WebSci '20: 12th ACM Conference on Web Science, 2020
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
"Anyone Else Seeing this Error?": Community, System Administrators, and Patch Information.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
"I Don't Know Too Much About It": On the Security Mindsets of Computer Science Students.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
2018
Automatic Phishing Detection vesus User Training, Is there a Middle Ground Using XAI?
Proceedings of the SICSA Workshop on Reasoning, 2018
2017
Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Factors Related to Privacy Concerns and Protection Behaviors Regarding Behavioral Advertising.
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 2015
2014
Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2012
Out of sight, out of mind: Effects of displaying access-control information near the item it controls.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
2011
More than skin deep: measuring effects of the underlying model on access-control system usability.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
2008
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007