Michelle L. Mazurek
Orcid: 0000-0003-4151-6428Affiliations:
- University of Maryland, College Park, MD, USA
According to our database1,
Michelle L. Mazurek
authored at least 115 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads.
Proc. Priv. Enhancing Technol., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
A Survey of Cybersecurity Professionals' Perceptions and Experiences of Safety and Belonging in the Community.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Designing a Data-Driven Survey System: Leveraging Participants' Online Data to Personalize Surveys.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Toxicity Detection is NOT all you Need: Measuring the Gaps to Supporting Volunteer Content Moderators.
CoRR, 2023
Analysis of Google Ads Settings Over Time: Updated, Individualized, Accurate, and Filtered.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023
Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Garbage Collection Makes Rust Easier to Use: A Randomized Controlled Trial of the Bronze Garbage Collector.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
CoRR, 2021
From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online.
Proceedings of the 30th USENIX Security Symposium, 2021
Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Pursuing Usable and Useful Data Downloads Under GDPR/CCPA Access Rights via Co-Design.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and Smart-Speaker Platforms.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes.
login Usenix Mag., 2020
ACM Trans. Priv. Secur., 2020
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs.
IEEE Secur. Priv., 2020
What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 37th International Conference on Machine Learning, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the AIES '20: AAAI/ACM Conference on AI, 2020
2019
Proceedings of the World Wide Web Conference, 2019
How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Proceedings of the 2019 IEEE Cybersecurity Development, 2019
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers.
Proc. Priv. Enhancing Technol., 2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the 2018 ACM Conference on Economics and Computation, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Secur. Priv., 2017
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
ACM Trans. Inf. Syst. Secur., 2016
I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
You Get Where You're Looking for: The Impact of Information Sources on Code Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.
Proceedings of the IEEE Cybersecurity Development, 2016
Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IEEE Internet Comput., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
2014
PhD thesis, 2014
Proceedings of the 12th USENIX conference on File and Storage Technologies, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
Visualizing Request-Flow Comparison to Aid Performance Diagnosis in Distributed Systems.
IEEE Trans. Vis. Comput. Graph., 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012
Proceedings of the 10th USENIX conference on File and Storage Technologies, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010