Konstantin Beznosov
Orcid: 0000-0002-1327-7477
According to our database1,
Konstantin Beznosov
authored at least 129 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Trust, Privacy, and Safety Factors Associated with Decision Making in P2P Markets Based on Social Networks: A Case Study of Facebook Marketplace in USA and Canada.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2022
Users' Expectations, Experiences, and Concerns With COVID Alert, an Exposure-Notification App.
Proc. ACM Hum. Comput. Interact., 2022
Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
COVID-19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People's Adoption Intention.
Proceedings of the CHIIR '22: ACM SIGIR Conference on Human Information Interaction and Retrieval, Regensburg, Germany, March 14, 2022
2021
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
SoK: Human, Organizational, and Technological Dimensions of Developers' Challenges in Engineering Secure Software.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Proceedings of the 29th European Conference on Information Systems, 2021
The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Security Notifications in Static Analysis Tools: Developers' Attitudes, Comprehension, and Ability to Act on Them.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
ACM Trans. Priv. Secur., 2020
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Is Implicit Authentication on Smartphones Really Popular? On Android Users' Perception of "Smart Lock for Android".
Proceedings of the MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, 2020
Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users.
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017
2016
Pervasive Mob. Comput., 2016
Pervasive Mob. Comput., 2016
Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs.
Comput. Secur., 2016
Comput. Hum. Behav., 2016
Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population.
Proceedings of the 2016 New Security Paradigms Workshop, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015
2014
Efficient Authentication and Key Management Mechanisms for Smart Grid Communications.
IEEE Syst. J., 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
To Authorize or Not Authorize: Helping Users Review Access Policies in Organizations.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model.
ACM Trans. Internet Techn., 2013
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013
Does my password go up to eleven?: the impact of password meters on password selection.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures.
Comput. Secur., 2012
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012
The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Toward understanding distributed cognition in IT security management: the role of cues and norms.
Cogn. Technol. Work., 2011
Improving malicious URL re-evaluation scheduling through an empirical study of malware download centers.
Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality, 2011
Proceedings of the Symposium On Usable Privacy and Security, 2011
On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings.
Proceedings of the Symposium On Usable Privacy and Security, 2011
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings.
Proceedings of the Symposium On Usable Privacy and Security, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Preparation, detection, and analysis: the diagnostic work of IT security incident response.
Inf. Manag. Comput. Secur., 2010
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks.
Int. J. Secur. Softw. Eng., 2010
Do windows users follow the principle of least privilege?: investigating user account control practices.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication.
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 6th Workshop on Digital Identity Management, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
IEEE Trans. Parallel Distributed Syst., 2009
An integrated view of human, organizational, and technological challenges of IT security management.
Inf. Manag. Comput. Secur., 2009
Security practitioners in context: Their activities and interactions with other stakeholders within organizations.
Int. J. Hum. Comput. Stud., 2009
Identification of sources of failures and their propagation in critical infrastructures from 12 years of public failure reports.
Int. J. Crit. Infrastructures, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009
Proceedings of the Second European Workshop on System Security, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
A case study of enterprise identity management system adoption in an insurance organization.
Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2009
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge.
IEEE Softw., 2008
IEEE Internet Comput., 2008
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
Human, Organizational and Technological Challenges of Implementing IT Security in Organizations.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
Identifying Differences between Security and other IT Professionals: a Qualitative Analysis.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2008
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Inf. Manag. Comput. Secur., 2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
2006
EURASIP J. Wirel. Commun. Netw., 2006
The secondary and approximate authorization model and its application to Bell-LaPadula policies.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services.
Proceedings of the Component-Based Software Engineering, 8th International Symposium, 2005
2004
Here's Your Lego<sup>TM</sup> Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need.
Proceedings of the Software Engineering and Middleware, 4th International Workshop, 2004
Applying Aspect-Orientation in Designing Security Systems: A Case Study.
Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2004), 2004
Proceedings of the Security and Protection in Information Processing Systems, 2004
Proceedings of the New Security Paradigms Workshop 2004, 2004
Proceedings of the 3rd Workshop on Adaptive and Reflective Middleware, 2004
Implementing Multiple Channels over SSL.
Proceedings of the ICETE 2004, 2004
2003
IEEE Trans. Knowl. Data Eng., 2003
2002
Object Security Attributes: Enabling Application-Specific Access Control in Middleware.
Proceedings of the On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002 Irvine, California, USA, October 30, 2002
1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998