Serge Egelman
Orcid: 0000-0003-2288-0785Affiliations:
- University of California, Berkeley, USA
- International Computer Science Institute, Berkeley, CA, USA
According to our database1,
Serge Egelman
authored at least 93 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
EU Cyber Resilience Act: Socio-Technical and Research Challenges (Dagstuhl Seminar 24112).
Dagstuhl Reports, 2024
The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services.
CoRR, 2024
2023
Lessons in VCR Repair: Compliance of Android App Developers with the California Consumer Privacy Act (CCPA).
Proc. Priv. Enhancing Technol., July, 2023
A Model of Contextual Factors Affecting Older Adults' Information-Sharing Decisions in the U.S.
ACM Trans. Comput. Hum. Interact., February, 2023
Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
2022
Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps.
Proc. Priv. Enhancing Technol., 2022
Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives.
Proc. ACM Hum. Comput. Interact., 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods.
Proceedings of the 3rd International CoNEXT Student Workshop, 2022
2020
Proc. Priv. Enhancing Technol., 2020
CoRR, 2020
Nudge me right: Personalizing online security nudges to people's decision-making styles.
Comput. Hum. Behav., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.
Proceedings of the 29th USENIX Security Symposium, 2020
"You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management Processes in the Wild.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020
2019
50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System.
login Usenix Mag., 2019
Investigating Users' Preferences and Expectations for Always-Listening Voice Assistants.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Information Design in An Aged Care Context: Views of Older Adults on Information Sharing in a Care Triad.
Proceedings of the 13th EAI International Conference on Pervasive Computing Technologies for Healthcare, 2019
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019
A Promise Is A Promise: The Effect of Commitment Devices on Computer Security Intentions.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Proc. Priv. Enhancing Technol., 2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
The Anatomy Of Smartphone Unlocking: Why and How Android Users Around the World Lock their Phones.
GetMobile Mob. Comput. Commun., 2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Behavior Ever Follows Intention?: A Validation of the Security Behavior Intentions Scale (SeBIS).
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
The Myth of the Average User: Improving Privacy and Security Systems through Individualization.
Proceedings of the 2015 New Security Paradigms Workshop, 2015
Proceedings of the HCI in Business - Second International Conference, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
2014
Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices.
Int. J. Mob. Hum. Comput. Interact., 2014
The effect of developer-specified explanations for permission requests on smartphone user behavior.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources.
Proceedings of the Symposium On Usable Privacy and Security, 2013
Proceedings of the New Security Paradigms Workshop, 2013
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Does my password go up to eleven?: the impact of password meters on password selection.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
Proceedings of the Economics of Information Security and Privacy, 2013
2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Proceedings of the Financial Cryptography and Data Security, 2012
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns.
Proceedings of the SPSM'12, 2012
2011
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study.
Inf. Syst. Res., 2011
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice.
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
2009
Proceedings of the 18th USENIX Security Symposium, 2009
It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
It's not what you know, but who you know: a social approach to last-resort authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Timing is everything?: the effects of timing and placement of online privacy indicators.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
2008
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, 2008
You've been warned: an empirical study of the effectiveness of web browser phishing warnings.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the Extended Abstracts Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007
2006
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006
2004