Mahdi N. Al-Ameen
Orcid: 0000-0002-5764-2253
According to our database1,
Mahdi N. Al-Ameen
authored at least 52 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Leveraging the Power of Storytelling to Encourage and Empower Children towards Strong Passwords.
Proc. ACM Hum. Comput. Interact., 2024
Proc. ACM Hum. Comput. Interact., 2024
"It's hard for him to make choices sometimes and he needs guidance": Re-orienting Parental Control for Children.
Proc. ACM Hum. Comput. Interact., 2024
"...I have my dad, sister, brother, and mom's password": unveiling users' mental models of security and privacy-preserving tools.
Inf. Comput. Secur., 2024
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024
A First Look into Fake Profiles on Social Media through the Lens of Victim's Experiences.
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024
A First Look into Targeted Clickbait and its Countermeasures: The Power of Storytelling.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
"I feel like he's looking in the computer world to be social, but I can't trust his judgement": Reimagining Parental Control for Children with ASD.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
"It's like educating us older people...": Unveiling Needs and Expectations Regarding Educational Features within Parental Control Tools.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proc. ACM Hum. Comput. Interact., April, 2023
Towards Improving the Efficacy of Windows Security Notifier for Apps from Unknown Publishers: The Role of Rhetoric.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
"I Have Learned that Things are Different here": Understanding the Transitional Challenges with Technology Use After Relocating to the USA.
Proceedings of the Cross-Cultural Design, 2023
Understanding the Challenges in Academia to Prepare Nursing Students for Digital Technology Use at Workplace.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023
"\"It doesn't just feel like something a lawyer slapped together.\"- Mental-Model-Based Privacy Policy for Third-Party Applications on Facebook".
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023
"After she fell asleep, it went to my next podcast, which was about a serial killer": Unveiling Needs and Expectations Regarding Parental Control within Digital Assistant.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023
Can Password Meter be More Effective Towards User Attention, Engagement, and Attachment?: A Study of Metaphor-based Designs.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023
2022
Imagined Online Communities: Communionship, Sovereignty, and Inclusiveness in Facebook Groups.
Proc. ACM Hum. Comput. Interact., 2022
Understanding the Behavior, Challenges, and Privacy Risks in Digital Technology Use by Nursing Professionals.
Proc. ACM Hum. Comput. Interact., 2022
Behav. Inf. Technol., 2022
Intermediate Help with Using Digital Devices and Online Accounts: Understanding the Needs, Expectations, and Vulnerabilities of Young Adults.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022
The Role of Intermediaries, Terrorist Assemblage, and Re-skilling in the Adoption of Cashless Transaction Systems in Bangladesh.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022
2021
"We, three brothers have always known everything of each other": A Cross-cultural Study of Sharing Digital Devices and Online Accounts.
Proc. Priv. Enhancing Technol., 2021
Inf. Comput. Secur., 2021
Inf. Comput. Secur., 2021
Comput. Secur., 2021
Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021
Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021
Purdah, Amanah, and Gheebat: Understanding Privacy in Bangladeshi "pious" Muslim Communities.
Proceedings of the COMPASS '21: ACM SIGCAS Conference on Computing and Sustainable Societies, Virtual Event, Australia, 28 June 2021, 2021
2020
Proceedings of the 2020 International Conference on Information and Communication Technologies and Development, 2020
"Most Companies Share Whatever They Can to Make Money!": Comparing User's Perceptions with the Data Practices of IoT Devices.
Proceedings of the Human Aspects of Information Security and Assurance, 2020
Understanding the Sensibility of Social Media Use and Privacy with Bangladeshi Facebook Group Users.
Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies, 2020
We Don't Give a Second Thought Before Providing Our Information: Understanding Users' Perceptions of Information Collection by Apps in Urban Bangladesh.
Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies, 2020
Proceedings of the Companion Publication of the 2020 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2020
2019
Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2017
Interact. Comput., 2017
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017
When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers.
Proceedings of the 26th USENIX Security Symposium, 2017
Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
2016
J. Netw. Comput. Appl., 2016
Inf. Comput. Secur., 2016
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016
2015
The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
CoRR, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
J. Networks, 2012