Sonia Chiasson
Orcid: 0000-0001-7314-2198
According to our database1,
Sonia Chiasson
authored at least 99 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Influences of displaying permission-related information on web single sign-on login decisions.
Comput. Secur., 2024
2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
"A Solution to a Problem that Didn't Exist?": Exploring Attitudes Towards Smart Streetlight Systems.
Proceedings of the Human-Computer Interaction - INTERACT 2023 - 19th IFIP TC13 International Conference, York, UK, August 28, 2023
"It's not that I want to see the student's bedroom...": Instructor Perceptions of e-Proctoring Software.
Proceedings of the 2023 European Symposium on Usable Security, 2023
A comparison of users' and non-users' perceptions of health and ancestry at-home DNA testing.
Proceedings of the 2023 European Symposium on Usable Security, 2023
2022
Privacy and Safety on Social Networking Sites: Autistic and Non-Autistic Teenagers' Attitudes and Behaviors.
ACM Trans. Comput. Hum. Interact., 2022
ACM Comput. Surv., 2022
CoRR, 2022
Behav. Inf. Technol., 2022
Proceedings of the NordiCHI '22: Nordic Human-Computer Interaction Conference, Aarhus, Denmark, October 8, 2022
Users, Smart Homes, and Digital Assistants: Impact of Technology Experience and Adoption.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022
"I just want to play games with friends and it asked me for all of my information": Trading privacy for connection during the COVID-19 pandemic.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022
2021
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens.
ACM Trans. Priv. Secur., 2021
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
"Whether it's moral is a whole other story": Consumer perspectives on privacy regulations and corporate data practices.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
"I'm Literally Just Hoping This Will Work: " Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
"It's So Difficult to Sever that Connection": The Role of FoMO in Users' Reluctant Privacy Behaviours.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
"They think it's totally fine to talk to somebody on the internet they don't know": Teachers' perceptions and mitigation strategies of tweens' online risks.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
"I'm Not a Millionaire": How Users' Online Behaviours and Offline Behaviours Impact Their Privacy.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols.
IACR Cryptol. ePrint Arch., 2020
The Influence of Decaying the Representation of Older Social Media Content on Simulated Hiring Decisions.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
'Lime', 'Open Lock', and 'Blocked': Children's Perception of Colors, Symbols, and Words in Cybersecurity Warnings.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Understanding Fitness Tracker Users' Security and Privacy Knowledge, Attitudes and Behaviours.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
"I'm hoping they're an ethical company that won't do anything that I'll regret": Users Perceptions of At-home DNA Testing Companies.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
End-Users and Service Providers: Trust and Distributed Responsibility for Account Security.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach.
ACM Trans. Priv. Secur., 2018
IEEE Internet Comput., 2018
Int. J. Child Comput. Interact., 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 17th ACM Conference on Interaction Design and Children, 2018
Proceedings of the 17th ACM Conference on Interaction Design and Children, 2018
2017
Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy.
Int. J. Child Comput. Interact., 2017
When private and professional lives meet: The impact of digital footprints on employees and political candidates.
Proceedings of the 8th International Conference on Social Media & Society, 2017
Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
No passwords needed: the iterative design of a parent-child authentication mechanism.
Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2017
Proceedings of the HCI 2017, 2017
Proceedings of the HCI 2017, 2017
Proceedings of the HCI 2017, 2017
2016
Pers. Ubiquitous Comput., 2016
The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity.
Int. J. Hum. Comput. Interact., 2016
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016
Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016
Proceedings of the 8th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2016
From Nosy Little Brothers to Stranger-Danger: Children and Parents' Perception of Mobile Threats.
Proceedings of the The 15th International Conference on Interaction Design and Children, 2016
Proceedings of the The 15th International Conference on Interaction Design and Children, 2016
2015
Int. J. Hum. Comput. Stud., 2015
Des. Codes Cryptogr., 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the 2015 New Security Paradigms Workshop, 2015
What's the deal with privacy apps?: a comprehensive exploration of user perception and usability.
Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, Linz, Austria, November 30, 2015
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015
2014
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion.
IEEE Trans. Dependable Secur. Comput., 2014
Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices.
Int. J. Mob. Hum. Comput. Interact., 2014
Stop Clicking on "Update Later": Persuading Users They Need Up-to-Date Antivirus Protection.
Proceedings of the Persuasive Technology - 9th International Conference, 2014
2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism.
IEEE Trans. Dependable Secur. Comput., 2012
Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the 2012 eCrime Researchers Summit, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Exploring usability effects of increasing security in click-based graphical passwords.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Int. J. Inf. Sec., 2009
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
Multiple password interference in text passwords and click-based graphical passwords.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008
Proceedings of the Persuasive Technology, Third International Conference, 2008
Proceedings of the Usability, Psychology, and Security, 2008
Proceedings of the 2008 Conference on Future Play: Research, Play, Share, 2008
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008
2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the Companion to the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007
Proceedings of the Computer Security, 2007
2006
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006
2005
Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005