M. Angela Sasse
Orcid: 0000-0003-1823-5505Affiliations:
- Ruhr University Bochum, Bochum, Germany (since 2018)
- University College London (UCL), Department of Computer Science, London, UK
- University of Birmingham, Birmingham, UK
According to our database1,
M. Angela Sasse
authored at least 175 papers
between 1989 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on publons.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Simulated Stress: A Case Study of the Effects of a Simulated Phishing Campaign on Employees' Perception, Stress and Self-Efficacy.
Proceedings of the 33rd USENIX Security Symposium, 2024
The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts.
Proceedings of the 33rd USENIX Security Symposium, 2024
Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
"Employees Who Don't Accept the Time Security Takes Are Not Aware Enough": The CISO View of Human-Centred Security.
Proceedings of the 32nd USENIX Security Symposium, 2023
"To Do This Properly, You Need More Resources": The Hidden Costs of Introducing Simulated Phishing Campaigns.
Proceedings of the 32nd USENIX Security Symposium, 2023
Lacking the Tools and Support to Fix Friction: Results from an Interview Study with Security Managers.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
Caring Not Scaring - An Evaluation of a Workshop to Train Apprentices as Security Champions.
Proceedings of the 2023 European Symposium on Usable Security, 2023
Security Champions Without Support: Results from a Case Study with OWASP SAMM in a Large-Scale E-Commerce Enterprise.
Proceedings of the 2023 European Symposium on Usable Security, 2023
"As Usual, I Needed Assistance of a Seeing Person": Experiences and Challenges of People with Disabilities and Authentication Methods.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies.
CoRR, 2022
Getting Users Smart Quick about Security: Results from 90 Minutes of Using a Persuasive Toolkit for Facilitating Information Security Problem Solving by Non-Professionals.
CoRR, 2022
How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the Mensch und Computer 2022 - Workshopband, Darmstadt, Germany, September 4, 2022
Putting Security on the Table: The Digitalisation of Security Tabletop Games and its Challenging Aftertaste.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering Education and Training, 2022
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022
Rebooting IT Security Awareness - How Organisations Can Encourage and Sustain Secure Behaviours.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
2021
Bringing Crypto Knowledge to School: Examining and Improving Junior High School Students' Security Assumptions About Encrypted Chat Apps.
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021
"Taking out the Trash": Why Security Behavior Change requires Intentional Forgetting.
Proceedings of the NSPW '21: New Security Paradigms Workshop, Virtual Event, USA, October 25, 2021
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Microsoft Office Macro Warnings: A Design Comedy of Errors with Tragic Security Consequences.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers.
Softw. Pract. Exp., 2020
Datenschutz und Datensicherheit, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Authentication Beyond Desktops and Smartphones: Novel Approaches for Smart Devices and Environments.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Why Jenny can't figure out which of these messages is a covert information operation.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019
Proceedings of the 9th International Conference on the Internet of Things, 2019
Interventions for software security: creating a lightweight program of assurance techniques for developers.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
2018
Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr.
Proc. ACM Hum. Comput. Interact., 2018
J. Inf. Secur. Appl., 2018
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
2017
International comparison of bank fraud reimbursement: customer perceptions and contractual terms.
J. Cybersecur., 2017
Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
2016
IEEE Secur. Priv., 2016
IEEE Secur. Priv., 2016
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens.
CoRR, 2016
The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions.
CoRR, 2016
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions.
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016
Proceedings of the Workshop on Security Fatigue, 2016
Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
"I don't like putting my face on the Internet!": An acceptance study of face biometrics as a CAPTCHA replacement.
Proceedings of the IEEE International Conference on Identity, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
"They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking.
CoRR, 2015
Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015
Employee Rule Breakers, Excuse Makers and Security Champions: : Mapping the risk perceptions and emotions that drive security behaviors.
Proceedings of the 2015 New Security Paradigms Workshop, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014
Desperately seeking assurances: Segmenting users by their information-seeking preferences.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Cross-Cultural Design, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the Cyberpatterns, 2014
2013
'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312).
Dagstuhl Reports, 2013
"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
"Technology Should Be Smarter Than This!": A Vision for Overcoming the Great Authentication Fatigue.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization.
Proceedings of the 21st European Conference on Information Systems, 2013
Proceedings of the DIM'13, 2013
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application.
Proceedings of the Economics of Information Security and Privacy, 2013
2012
IEEE Secur. Priv., 2012
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Guiding decisions on authorization policies: a participatory approach to decision support.
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the New Security Paradigms Workshop, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
When did my mobile turn into a 'sellphone'?: a study of consumer responses to tailored smartphone ads.
Proceedings of the BCS-HCI '12 Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, 2012
Proceedings of the European Data Protection: In Good Health?, 2012
Privacy for Loan Applicants Versus Predictive Power for Loan Providers: Is It Possible to Bridge the Gap?
Proceedings of the European Data Protection: In Good Health?, 2012
2011
Entertain. Comput., 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Information security as organizational power: A framework for re-thinking security policies.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011
Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication.
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010
2009
ACM Trans. Multim. Comput. Commun. Appl., 2009
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science.
Int. J. Hum. Comput. Stud., 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Exploring blog spaces: a study of blog reading experiences using dynamic contextual displays.
Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, 2009
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security.
Proceedings of the Managing Information Risk and the Economics of Security, 2009
2008
Multim. Tools Appl., 2008
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
Expressions of expertness: the virtuous circle of natural language for access control policy specification.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
Proceedings of the 16th International Conference on Multimedia 2008, 2008
To catch a thief - you need at least 8 frames per second: the impact of frame rates on user performance in a CCTV detection task.
Proceedings of the 16th International Conference on Multimedia 2008, 2008
The challenges faced by academia preparing students for industry: what we teach and what we do.
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008
2007
Int. J. Electron. Secur. Digit. Forensics, 2007
Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems.
IEEE Secur. Priv., 2007
The kindest cut: enhancing the user experience of mobile tv through adequate zooming.
Proceedings of the 15th International Conference on Multimedia 2007, 2007
Contextualizing the blogosphere: a comparison of traditional and novel user interfaces for the web.
Proceedings of the 21st British HCI Group Annual Conference on HCI 2007: HCI...but not as we know it, 2007
Proceedings of the 21st British HCI Group Annual Conference on HCI 2007: HCI...but not as we know it, 2007
Usability is the best policy: public policy and the lived experience of transport systems in London.
Proceedings of the 21st British HCI Group Annual Conference on HCI 2007: HCI...but not as we know it, 2007
"The devil you know knows best": how online recommendations can benefit from social networking.
Proceedings of the 21st British HCI Group Annual Conference on HCI 2007: HCI...but not as we know it, 2007
2006
Reading the fine print: the effect of text legibility on perceived video quality in mobile tv.
Proceedings of the 14th ACM International Conference on Multimedia, 2006
Proceedings of the Mensch und Computer 2006: Mensch und Computer im Strukturwandel, 2006
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006
2005
'R-What?' Development of a role-based access control policy-writing tool for e-Scientists.
Softw. Pract. Exp., 2005
Int. J. Hum. Comput. Stud., 2005
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems.
Proceedings of the New Security Paradigms Workshop 2005, 2005
Proceedings of the 13th ACM International Conference on Multimedia, 2005
Proceedings of the 13th ACM International Conference on Multimedia, 2005
Do people trust their eyes more than ears?: media bias in detecting cues of expertise.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005
Proceedings of the People and Computers XIX, 2005
"I thought it was terrible and everyone else loved it" - A New Perspective for Effective Recommender System Design.
Proceedings of the People and Computers XIX, 2005
2004
Sharp or smooth?: comparing the effects of quantization vs. frame rate for streamed video.
Proceedings of the 2004 Conference on Human Factors in Computing Systems, 2004
"Stuff goes into the computer and doesn't come out": a cross-tool study of personal information management.
Proceedings of the 2004 Conference on Human Factors in Computing Systems, 2004
2003
Int. J. Hum. Comput. Stud., 2003
Proceedings of the New Security Paradigms Workshop 2003, 2003
Shiny happy people building trust?: photos on e-commerce websites and consumer trust.
Proceedings of the 2003 Conference on Human Factors in Computing Systems, 2003
The impact of avatar realism and eye gaze control on perceived quality of communication in a shared immersive virtual environment.
Proceedings of the 2003 Conference on Human Factors in Computing Systems, 2003
2002
Eye-Catcher of Blind Spot? The Effect of Photographs of Faces on eCommerce Sites.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002
2001
Pretty good persuasion: a first step towards effective password security in the real world.
Proceedings of the New Security Paradigms Workshop 2001, 2001
Proceedings of the New Security Paradigms Workshop 2001, 2001
Why Value Is Everything: A User-Centered Approach to Internet Quality of Service and Pricing.
Proceedings of the Quality of Service, 2001
Trustbuilders and Trustbusters - The Role of Trust Cues in Interfaces to e-Commerce Applications.
Proceedings of the Towards The E-Society: E-Commerce, 2001
Designing QoS and Charging Mechanisms: He who pays the service shapes the design.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001
Proceedings of the CHI 2001 Extended Abstracts on Human Factors in Computing Systems, 2001
Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31, 2001
Proceedings of the People and Computers XV, 2001
2000
The good, the bad, and the muffled: the impact of different degradations on Internet speech.
Proceedings of the 8th ACM International Conference on Multimedia 2000, Los Angeles, CA, USA, October 30, 2000
Proceedings of the CHI '00 Extended Abstracts on Human Factors in Computing Systems, 2000
Proceedings of the CHI '00 Extended Abstracts on Human Factors in Computing Systems, 2000
Do Users Always Know What's Good For Them? Utilising Physiological Responses to Assess Media Quality.
Proceedings of the People and Computers XIV - Usability or Else!, 2000
Proceedings of the People and Computers XIV - Usability or Else!, 2000
1999
Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30, 1999
Proceedings of the Affective Interactions, 1999
Examining Users' Repertoire of Internet Applications.
Proceedings of the Human-Computer Interaction INTERACT '99: IFIP TC13 International Conference on Human-Computer Interaction, 1999
Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie?
Proceedings of the Human-Computer Interaction INTERACT '99: IFIP TC13 International Conference on Human-Computer Interaction, 1999
It Ain't What You Charge, It's The Way That You Do It: A User Perspective of Network QoS and Pricing.
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999
1998
Measuring Perceived Quality of Speech and Video in Multimedia Conferencing Applications.
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998
1997
Proceedings of the People and Computers XII, Proceedings of HCI '97, 1997
Proceedings of the People and Computers XII, Proceedings of HCI '97, 1997
1996
Interact. Comput., 1996
1994
International Research Seminars through Multimedia Conferencing: Experiences from the MICE project.
Proceedings of the Broadband Islands '94, 1994
1993
Multimedia Integrated Conferencing for European Researchers (MICE): Piloting Activities and the Conference Management and Multiplexing Centre.
Comput. Networks ISDN Syst., 1993
Support for Collaborative Authoring via Electronic Mail: The MESSIE Environment.
Proceedings of the Third European Conference on Computer Supported Cooperative Work, 1993
1991
Book Review: "Cognitive Ergonomics and Human-Computer Interaction, " edited by J. Long and A. Whitefield.
Int. J. Man Mach. Stud., 1991
1989
How to t(r)ap user's mental models.
Proceedings of the Mental Models and Human-Computer Interaction 2 [selected papers of the 8th Interdisciplinary Workshop in Informatics and Psychology, 1989