Robert W. Reeder
Affiliations:- Microsoft
According to our database1,
Robert W. Reeder
authored at least 34 papers
between 2001 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on dl.acm.org
On csauthors.net:
Bibliography
2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
IEEE Secur. Priv., 2017
2016
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the Serious Games - Second Joint International Conference, 2016
"She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
2014
Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
"My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
Your attention please: designing security-decision UIs to make genuine risks harder to ignore.
Proceedings of the Symposium On Usable Privacy and Security, 2013
2011
IEEE Secur. Priv., 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
More than skin deep: measuring effects of the underlying model on access-control system usability.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
It's not what you know, but who you know: a social approach to last-resort authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Laissez-faire file sharing: access control designed for individuals at the endpoints.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Proceedings of the Human-Computer Interaction, 2007
2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
2005
Int. J. Hum. Comput. Stud., 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
2002
Proceedings of the Working Conference on Advanced Visual Interfaces, 2002
2001
WebEyeMapper and WebLogger: tools for analyzing eye tracking data collected in web-use studies.
Proceedings of the CHI 2001 Extended Abstracts on Human Factors in Computing Systems, 2001
Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability.
Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31, 2001