Michelle L. Mazurek

Orcid: 0000-0003-4151-6428

Affiliations:
  • University of Maryland, College Park, MD, USA


According to our database1, Michelle L. Mazurek authored at least 116 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads.
Proc. Priv. Enhancing Technol., 2024

As Advertised? Understanding the Impact of Influencer VPN Ads.
CoRR, 2024

Data Subjects' Reactions to Exercising Their Right of Access.
Proceedings of the 33rd USENIX Security Symposium, 2024

A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends.
Proceedings of the 33rd USENIX Security Symposium, 2024

SoK: Safer Digital-Safety Research Involving At-Risk Users.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

How Entertainment Journalists Manage Online Hate and Harassment.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

Understanding How People Share Passwords.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

A Survey of Cybersecurity Professionals' Perceptions and Experiences of Safety and Belonging in the Community.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

Write, Read, or Fix? Exploring Alternative Methods for Secure Development Studies.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

Toxicity Detection is NOT all you Need: Measuring the Gaps to Supporting Volunteer Content Moderators through a User-Centric Method.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

Designing a Data-Driven Survey System: Leveraging Participants' Online Data to Personalize Surveys.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

2023
Editors' Introduction.
Proc. Priv. Enhancing Technol., October, 2023

Toxicity Detection is NOT all you Need: Measuring the Gaps to Supporting Volunteer Content Moderators.
CoRR, 2023

Analysis of Google Ads Settings Over Time: Updated, Individualized, Accurate, and Filtered.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities.
Proceedings of the 32nd USENIX Security Symposium, 2023

The Role of Professional Product Reviewers in Evaluating Security and Privacy.
Proceedings of the 32nd USENIX Security Symposium, 2023

Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023

Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Characterizing Everyday Misuse of Smart Home Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Optimistic Access Control for the Smart Home.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Editors' Introduction.
Proc. Priv. Enhancing Technol., 2022

Why Users (Don't) Use Password Managers at a Large Educational Institution.
Proceedings of the 31st USENIX Security Symposium, 2022

SoK: A Framework for Unifying At-Risk User Research.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Investigating Influencer VPN Ads on YouTube.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Garbage Collection Makes Rust Easier to Use: A Randomized Controlled Trial of the Bronze Garbage Collector.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

We Are the Experts, and We Are the Problem: The Security Advice Fiasco.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
ML-CB: Machine Learning Canvas Block.
Proc. Priv. Enhancing Technol., 2021

Does the Bronze Garbage Collector Make Rust Easier to Use? A Controlled Experiment.
CoRR, 2021

From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

Strategies and Perceived Risks of Sending Sensitive Documents.
Proceedings of the 30th USENIX Security Symposium, 2021

"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online.
Proceedings of the 30th USENIX Security Symposium, 2021

Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption.
Proceedings of the 30th USENIX Security Symposium, 2021

HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Pursuing Usable and Useful Data Downloads Under GDPR/CCPA Access Rights via Co-Design.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and Smart-Speaker Platforms.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes.
login Usenix Mag., 2020

Build It, Break It, Fix It: Contesting Secure Development.
ACM Trans. Priv. Secur., 2020

It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs.
IEEE Secur. Priv., 2020

What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data.
Proceedings of the 29th USENIX Security Symposium, 2020

An Observational Investigation of Reverse Engineers' Processes.
Proceedings of the 29th USENIX Security Symposium, 2020

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.
Proceedings of the 29th USENIX Security Symposium, 2020

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.
Proceedings of the 29th USENIX Security Symposium, 2020

Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Measuring Non-Expert Comprehension of Machine Learning Fairness Metrics.
Proceedings of the 37th International Conference on Machine Learning, 2020

User Attitudes On Direct-to-Consumer Genetic Testing.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Building and Validating a Scale for Secure Software Development Self-Efficacy.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Human Comprehension of Fairness in Machine Learning.
Proceedings of the AIES '20: AAAI/ACM Conference on AI, 2020

2019
Applied Digital Threat Modeling: It Works.
IEEE Secur. Priv., 2019

Auditing Offline Data Brokers via Facebook's Advertising Platform.
Proceedings of the World Wide Web Conference, 2019

How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

The Effect of Entertainment Media on Mental Models of Computer Security.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

A Qualitative Investigation of Insecure Code Propagation from Online Forums.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

Comparing and Developing Tools to Measure the Readability of Domain-Specific Texts.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

An Observational Investigation of Reverse Engineers' Process and Mental Models.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers.
Proc. Priv. Enhancing Technol., 2018

Comparing Hypothetical and Realistic Privacy Valuations.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level.
Proceedings of the 27th USENIX Security Symposium, 2018

Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

User Comfort with Android Background Resource Accesses in Different Contexts.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Dancing Pigs or Externalities?: Measuring the Rationality of Security Decisions.
Proceedings of the 2018 ACM Conference on Economics and Computation, 2018

Understanding User Tradeoffs for Search in Encrypted Communication.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Asking for a Friend: Evaluating Response Biases in Security User Studies.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Equitable Security: Optimizing Distribution of Nudges and Resources.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Balancing Security and Usability in Encrypted Email.
IEEE Internet Comput., 2017

How Internet Resources Might Be Helping You Develop Faster but Less Securely.
IEEE Secur. Priv., 2017

Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

Exploring User Perceptions of Discrimination in Online Targeted Advertising.
Proceedings of the 26th USENIX Security Symposium, 2017

Comparing the Usability of Cryptographic APIs.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

You Want Me To Do What? A Design Study of Two-Factor Authentication Messages.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Security Developer Studies with GitHub Users: Exploring a Convenience Sample.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Developers Need Support, Too: A Survey of Security Advice for Software Developers.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

Where is the Digital Divide?: A Survey of Security, Privacy, and Socioeconomics.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

User Interactions and Permission Use on Android.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Designing Password Policies for Strength and Usability.
ACM Trans. Inf. Syst. Secur., 2016

I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

You Get Where You're Looking for: The Impact of Information Sources on Code Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.
Proceedings of the IEEE Cybersecurity Development, 2016

Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Usability and Security of Text Passwords on Mobile Devices.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Build It, Break It, Fix It: Contesting Secure Development.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
The Effectiveness of Security Images in Internet Banking.
IEEE Internet Comput., 2015

Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Proceedings of the 24th USENIX Security Symposium, 2015

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
A Tag-Based, Logical Access-Control Framework for Personal File Sharing.
PhD thesis, 2014

Toward strong, usable access control for shared distributed data.
Proceedings of the 12th USENIX conference on File and Storage Technologies, 2014

Can long passwords be secure and usable?
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Visualizing Request-Flow Comparison to Aid Performance Diagnosis in Distributed Systems.
IEEE Trans. Vis. Comput. Graph., 2013

The post anachronism: the temporal dimension of facebook privacy.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013

Measuring password guessability for an entire university.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Helping Users Create Better Passwords.
login Usenix Mag., 2012

USENIX Notes.
login Usenix Mag., 2012

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012

ZZFS: a hybrid device and cloud file system for spontaneous users.
Proceedings of the 10th USENIX conference on File and Storage Technologies, 2012

Tag, you can see it!: using tags for access control in photo sharing.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Exploring reactive access control.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Of passwords and people: measuring the effect of password-composition policies.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Encountering stronger password requirements: user attitudes and behaviors.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Exploring reactive access control.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Access control for home data sharing: evaluating social acceptability.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010


  Loading...