default search action
M. Angela Sasse
Martina Angela Sasse
Person information
- affiliation (since 2018): Ruhr University Bochum, Bochum, Germany
- affiliation: University College London (UCL), Department of Computer Science, London, UK
- affiliation: University of Birmingham, Birmingham, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c128]Nele Borgert, Luisa Jansen, Imke Böse, Jennifer Friedauer, M. Angela Sasse, Malte Elson:
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods. CHI 2024: 973:1-973:32 - [c127]Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth, Yixin Zou, M. Angela Sasse:
Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups. SP 2024: 697-716 - [c126]Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, M. Angela Sasse:
The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts. USENIX Security Symposium 2024 - [c125]Markus Schöps, Marco Gutfleisch, Eric Wolter, M. Angela Sasse:
Simulated Stress: A Case Study of the Effects of a Simulated Phishing Campaign on Employees' Perception, Stress and Self-Efficacy. USENIX Security Symposium 2024 - 2023
- [c124]Jan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl:
"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. CCS 2023: 2740-2754 - [c123]Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CHI 2023: 582:1-582:23 - [c122]Ahmet Erinola, Annalina Buckmann, Jennifer Friedauer, Asli Yardim, M. Angela Sasse:
"As Usual, I Needed Assistance of a Seeing Person": Experiences and Challenges of People with Disabilities and Authentication Methods. EuroS&P Workshops 2023: 575-593 - [c121]Uta Menges, Jonas Hielscher, Laura Kocksch, Annette Kluge, M. Angela Sasse:
Caring Not Scaring - An Evaluation of a Workshop to Train Apprentices as Security Champions. EuroUSEC 2023: 237-252 - [c120]Marco Gutfleisch, Markus Schöps, Stefan Albert Horstmann, Daniel Wichmann, M. Angela Sasse:
Security Champions Without Support: Results from a Case Study with OWASP SAMM in a Large-Scale E-Commerce Enterprise. EuroUSEC 2023: 260-276 - [c119]Jonas Hielscher, Markus Schöps, Uta Menges, Marco Gutfleisch, Mirko Helbling, M. Angela Sasse:
Lacking the Tools and Support to Fix Friction: Results from an Interview Study with Security Managers. SOUPS 2023: 131-150 - [c118]Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse:
"Employees Who Don't Accept the Time Security Takes Are Not Aware Enough": The CISO View of Human-Centred Security. USENIX Security Symposium 2023: 2311-2328 - [c117]Lina Brunken, Annalina Buckmann, Jonas Hielscher, M. Angela Sasse:
"To Do This Properly, You Need More Resources": The Hidden Costs of Introducing Simulated Phishing Campaigns. USENIX Security Symposium 2023: 4105-4122 - [e8]Sokratis K. Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla:
Computer Security. ESORICS 2022 International Workshops - CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13785, Springer 2023, ISBN 978-3-031-25459-8 [contents] - [i11]Jan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl:
"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. CoRR abs/2309.00744 (2023) - 2022
- [c116]M. Angela Sasse, Jonas Hielscher, Jennifer Friedauer, Annalina Buckmann:
Rebooting IT Security Awareness - How Organisations Can Encourage and Sustain Secure Behaviours. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 248-265 - [c115]Marco Gutfleisch, Markus Schöps, Jonas Hielscher, Mary Cheney, Sibel Sayin, Nathalie Schuhmacher, Ali Mohamad, M. Angela Sasse:
Caring About IoT-Security - An Interview Study in the Healthcare Sector. EuroUSEC 2022: 202-215 - [c114]Marco Gutfleisch, Markus Schöps, Sibel Sayin, Frederic Wende, Martina Angela Sasse:
Putting Security on the Table: The Digitalisation of Security Tabletop Games and its Challenging Aftertaste. ICSE (SEET) 2022: 217-222 - [c113]Pascal Knierim, Sarah Prange, Sebastian S. Feger, Stefan Schneegaß, M. Angela Sasse, Dominik Bayerl, Hans-Joachim Hof, Florian Alt:
Inclusive Security by Design. MuC (Workshopband) 2022 - [c112]Peter Mayer, Damian Poddebniak, Konstantin Fischer, Marcus Brinkmann, Juraj Somorovsky, M. Angela Sasse, Sebastian Schinzel, Melanie Volkamer:
"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks. SOUPS @ USENIX Security Symposium 2022: 77-96 - [c111]Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse, Sascha Fahl:
How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study. SP 2022: 893-910 - [e7]Sokratis K. Katsikas, Costas Lambrinoudakis, Nora Cuppens, John Mylopoulos, Christos Kalloniatis, Weizhi Meng, Steven Furnell, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge:
Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13106, Springer 2022, ISBN 978-3-030-95483-3 [contents] - [i10]Martin Ruskov, Paul Ekblom, M. Angela Sasse:
Getting Users Smart Quick about Security: Results from 90 Minutes of Using a Persuasive Toolkit for Facilitating Information Security Problem Solving by Non-Professionals. CoRR abs/2209.02420 (2022) - [i9]Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CoRR abs/2212.10382 (2022) - [i8]Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Leonie Schaewitz, Jennifer Friedauer, Yasemin Acar, Markus Dürmuth, M. Angela Sasse:
Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies. CoRR abs/2212.12964 (2022) - 2021
- [c110]Uta Menges, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, Imogen Verret:
Why IT Security Needs Therapy. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 335-356 - [c109]Marco Gutfleisch, Maximilian Peiffer, Selim Erk, Martina Angela Sasse:
Microsoft Office Macro Warnings: A Design Comedy of Errors with Tragic Security Consequences. EuroUSEC 2021: 9-22 - [c108]Leonie Schaewitz, David Lakotta, M. Angela Sasse, Nikol Rummel:
Peeking Into the Black Box: Towards Understanding User Understanding of E2EE. EuroUSEC 2021: 129-140 - [c107]Jonas Hielscher, Annette Kluge, Uta Menges, M. Angela Sasse:
"Taking out the Trash": Why Security Behavior Change requires Intentional Forgetting. NSPW 2021: 108-122 - [c106]Leonie Schaewitz, Cedric A. Lohmann, Konstantin Fischer, M. Angela Sasse:
Bringing Crypto Knowledge to School: Examining and Improving Junior High School Students' Security Assumptions About Encrypted Chat Apps. STAST 2021: 43-64 - 2020
- [j33]Melanie Volkamer, Martina Angela Sasse, Franziska Boehm:
Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness. Datenschutz und Datensicherheit 44(8): 518-521 (2020) - [j32]Charles Weir, Ingolf Becker, James Noble, Lynne Blair, M. Angela Sasse, Awais Rashid:
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers. Softw. Pract. Exp. 50(3): 275-298 (2020) - [c105]Stefan Schneegass, M. Angela Sasse, Florian Alt, Daniel Vogel:
Authentication Beyond Desktops and Smartphones: Novel Approaches for Smart Devices and Environments. CHI Extended Abstracts 2020: 1-6 - [c104]Melanie Volkamer, Martina Angela Sasse, Franziska Boehm:
Analysing Simulated Phishing Campaigns for Staff. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 312-328 - [c103]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. ICICS 2020: 223-242 - [e6]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, M. Angela Sasse, Weizhi Meng, Steven Furnell, Joaquín García-Alfaro:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5 [contents] - [e5]Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, M. Angela Sasse:
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12580, Springer 2020, ISBN 978-3-030-66503-6 [contents] - [i7]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes affecting user decision to adopt a Virtual Private Network (VPN) app. CoRR abs/2008.06813 (2020)
2010 – 2019
- 2019
- [j31]Astrid Wichmann, M. Angela Sasse, Christof Paar:
IT-Sicherheit ist mehr als Technik. Datenschutz und Datensicherheit 43(11): 673-674 (2019) - [c102]Albese Demjaha, Tristan Caulfield, M. Angela Sasse, David J. Pym:
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes. EuroS&P Workshops 2019: 192-201 - [c101]Charles Weir, Ingolf Becker, James Noble, Lynne Blair, M. Angela Sasse, Awais Rashid:
Interventions for software security: creating a lightweight program of assurance techniques for developers. ICSE (SEIP) 2019: 41-50 - [c100]Thomas Cattermole, Simon Docherty, David J. Pym, M. Angela Sasse:
Asset-Oriented Access Control: Towards a New IoT Framework. IOT 2019: 31:1-31:4 - [c99]Tristan Caulfield, Jonathan M. Spring, M. Angela Sasse:
Why Jenny can't figure out which of these messages is a covert information operation. NSPW 2019: 118-128 - [c98]Nissy Sombatruang, Lucky Onwuzurike, M. Angela Sasse, Michelle Baddeley:
Factors influencing users to use unsecured wi-fi networks: evidence in the wild. WiSec 2019: 203-213 - [i6]Maria Bada, M. Angela Sasse, Jason R. C. Nurse:
Cyber Security Awareness Campaigns: Why do they fail to change behaviour? CoRR abs/1901.02672 (2019) - 2018
- [j30]Panagiotis Andriotis, Gianluca Stringhini, Martina Angela Sasse:
Studying users' adaptation to Android's run-time fine-grained access control system. J. Inf. Secur. Appl. 40: 31-43 (2018) - [j29]Mark Warner, Andreas Gutmann, M. Angela Sasse, Ann Blandford:
Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr. Proc. ACM Hum. Comput. Interact. 2(CSCW): 181:1-181:22 (2018) - [c97]Nissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto:
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. PST 2018: 1-11 - [c96]Charles Weir, Lynne Blair, Ingolf Becker, M. Angela Sasse, James Noble:
Light-Touch Interventions to Improve Software Development Security. SecDev 2018: 85-93 - [c95]Ingolf Becker, Simon Parkin, M. Angela Sasse:
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength. USENIX Security Symposium 2018: 239-253 - 2017
- [j28]Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch, M. Angela Sasse, Gianluca Stringhini:
International comparison of bank fraud reimbursement: customer perceptions and contractual terms. J. Cybersecur. 3(2): 109-125 (2017) - [c94]Steve Dodier-Lazaro, Ingolf Becker, Jens Krinke, M. Angela Sasse:
"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones. HCI (22) 2017: 25-44 - [c93]Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith:
Obstacles to the Adoption of Secure Communication Tools. IEEE Symposium on Security and Privacy 2017: 137-153 - [c92]Monica T. Whitty, Matthew Edwards, Michael Levi, Claudia Peersman, Awais Rashid, M. Angela Sasse, Tom Sorell, Gianluca Stringhini:
Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF). WWW (Companion Volume) 2017: 1311-1314 - 2016
- [j27]M. Angela Sasse, Matthew Smith:
The Security-Usability Tradeoff Myth [Guest editors' introduction]. IEEE Secur. Priv. 14(5): 11-13 (2016) - [j26]Deanna D. Caputo, Shari Lawrence Pfleeger, M. Angela Sasse, Paul Ammann, Jeff Offutt, Lin Deng:
Barriers to Usable Security? Three Organizational Case Studies. IEEE Secur. Priv. 14(5): 22-32 (2016) - [j25]M. Angela Sasse, Matthew Smith, Cormac Herley, Heather Lipford, Kami Vaniea:
Debunking Security-Usability Tradeoff Myths. IEEE Secur. Priv. 14(5): 33-39 (2016) - [c91]Johannes Sänger, Norman Hänsch, Brian Glass, Zinaida Benenson, Robert Landwirth, M. Angela Sasse:
Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces. CHI 2016: 3870-3882 - [c90]Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). Financial Cryptography 2016: 600-608 - [c89]Kat Krol, Simon Parkin, M. Angela Sasse:
"I don't like putting my face on the Internet!": An acceptance study of face biometrics as a CAPTCHA replacement. ISBA 2016: 1-7 - [c88]Adam Beautement, Ingolf Becker, Simon Parkin, Kat Krol, M. Angela Sasse:
Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours. SOUPS 2016: 253-270 - [c87]Simon Parkin, Kat Krol, Ingolf Becker, M. Angela Sasse:
Applying Cognitive Control Modes to Identify Security Fatigue Hotspots. WSF@SOUPS 2016 - [c86]Nissy Sombatruang, M. Angela Sasse, Michelle Baddeley:
Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions. STAST 2016: 61-72 - [c85]Panagiotis Andriotis, Martina Angela Sasse, Gianluca Stringhini:
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. WIFS 2016: 1-6 - [i5]Jeunese A. Payne, Graeme Jenkinson, Frank Stajano, M. Angela Sasse, Max Spencer:
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens. CoRR abs/1605.03478 (2016) - [i4]Brian Glass, Graeme Jenkinson, Yuqi Liu, M. Angela Sasse, Frank Stajano:
The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions. CoRR abs/1607.03417 (2016) - 2015
- [j24]M. Angela Sasse:
Scaring and Bullying People into Security Won't Work. IEEE Secur. Priv. 13(3): 80-83 (2015) - [j23]Iacovos Kirlappos, Simon E. Parkin, M. Angela Sasse:
"Shadow security" as a tool for the learning organization. SIGCAS Comput. Soc. 45(1): 29-37 (2015) - [c84]Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Matthew Smith:
POSTER: Secure Chat for the Masses? User-centered Security to the Rescue. CCS 2015: 1623-1625 - [c83]Kat Krol, Constantinos Papanicolaou, Alexei Vernitski, Martina Angela Sasse:
"Too Taxing on the Mind!" Authentication Grids are not for Everyone. HCI (22) 2015: 71-82 - [c82]Odette Beris, Adam Beautement, M. Angela Sasse:
Employee Rule Breakers, Excuse Makers and Security Champions: : Mapping the risk perceptions and emotions that drive security behaviors. NSPW 2015: 73-84 - [c81]Simon E. Parkin, Samy Driss, Kat Krol, M. Angela Sasse:
Assessing the User Experience of Password Reset Policies in a University. PASSWORDS 2015: 21-38 - [c80]Brian Glass, Michelle Baddeley, M. Angela Sasse:
Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty. WEIS 2015 - [i3]Kat Krol, Eleni Philippou, Emiliano De Cristofaro, Martina Angela Sasse:
"They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking. CoRR abs/1501.04434 (2015) - 2014
- [j22]Martina Angela Sasse, Charles C. Palmer:
Protecting You. IEEE Secur. Priv. 12(1): 11-13 (2014) - [j21]Martina Angela Sasse, Charles C. Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash, L. Jean Camp:
Helping You Protect You. IEEE Secur. Priv. 12(1): 39-42 (2014) - [c79]Iacovos Kirlappos, Martina Angela Sasse:
What Usable Security Really Means: Trusting and Engaging Users. HCI (24) 2014: 69-78 - [c78]Martina Angela Sasse, Michelle Steves, Kat Krol, Dana Chisnell:
The Great Authentication Fatigue - And How to Overcome It. HCI (19) 2014: 228-239 - [c77]Anthony Morton, Martina Angela Sasse:
Desperately seeking assurances: Segmenting users by their information-seeking preferences. PST 2014: 102-111 - [c76]Chris Porter, Emmanuel Letier, Martina Angela Sasse:
Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback. RE 2014: 374-383 - [p5]Martin Ruskov, Paul Ekblom, M. Angela Sasse:
Towards a Simulation of Information Security Behaviour in Organisations. Cyberpatterns 2014: 177-184 - [i2]Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela Sasse:
Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports 4(12): 1-28 (2014) - 2013
- [j20]Debi Ashenden, M. Angela Sasse:
CISOs and organisational culture: Their own worst enemy? Comput. Secur. 39: 396-405 (2013) - [c75]Sacha Brostoff, Charlene Jennett, Miguel Malheiros, Martina Angela Sasse:
Federated identity to access e-government services: are citizens ready for this? Digital Identity Management 2013: 97-108 - [c74]Steffen Bartsch, Martina Angela Sasse:
How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization. ECIS 2013: 53 - [c73]Iacovos Kirlappos, Adam Beautement, Martina Angela Sasse:
"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents. Financial Cryptography Workshops 2013: 70-82 - [c72]Michael Huth, Jim Huan-Pu Kuo, M. Angela Sasse, Iacovos Kirlappos:
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent. HCI (27) 2013: 246-255 - [c71]Martina Angela Sasse:
"Technology Should Be Smarter Than This!": A Vision for Overcoming the Great Authentication Fatigue. Secure Data Management 2013: 33-36 - [c70]Miguel Malheiros, Sören Preibusch, Martina Angela Sasse:
"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure. TRUST 2013: 250-266 - [p4]Miguel Malheiros, Sacha Brostoff, Charlene Jennett, M. Angela Sasse:
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application. The Economics of Information Security and Privacy 2013: 237-261 - [i1]Alessandro Acquisti, Ioannis Krontiris, Marc Langheinrich, Martina Angela Sasse:
'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312). Dagstuhl Reports 3(7): 74-107 (2013) - 2012
- [j19]Iacovos Kirlappos, Martina Angela Sasse:
Security Education against Phishing: A Modest Proposal for a Major Rethink. IEEE Secur. Priv. 10(2): 24-32 (2012) - [c69]Nicolette Conti, Charlene Jennett, Jose Maestre, Martina Angela Sasse:
When did my mobile turn into a 'sellphone'?: a study of consumer responses to tailored smartphone ads. BCS HCI 2012: 215-220 - [c68]Miguel Malheiros, Charlene Jennett, Snehalee Patel, Sacha Brostoff, Martina Angela Sasse:
Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising. CHI 2012: 579-588 - [c67]Kat Krol, Matthew Moroz, Martina Angela Sasse:
Don't work. Can't work? Why it's time to rethink security warnings. CRiSIS 2012: 1-8 - [c66]Anthony Morton, Martina Angela Sasse:
Privacy is a process, not a PET: a theory for effective privacy practice. NSPW 2012: 87-104 - [c65]Steffen Bartsch, Martina Angela Sasse:
Guiding decisions on authorization policies: a participatory approach to decision support. SAC 2012: 1502-1507 - [c64]Iacovos Kirlappos, Martina Angela Sasse, Nigel Harvey:
Why Trust Seals Don't Work: A Study of User Perceptions and Behavior. TRUST 2012: 308-324 - [c63]Miguel Malheiros, Sacha Brostoff, Charlene Jennett, M. Angela Sasse:
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application. WEIS 2012 - [p3]Charlene Jennett, Miguel Malheiros, Sacha Brostoff, Martina Angela Sasse:
Privacy for Loan Applicants Versus Predictive Power for Loan Providers: Is It Possible to Bridge the Gap? European Data Protection 2012: 35-51 - [p2]Christian W. Probst, Martina Angela Sasse, Wolter Pieters, Trajce Dimkov, Erik Luysterborg, Michel Arnaud:
Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider. European Data Protection 2012: 251-265 - 2011
- [j18]William Seager, Martin Ruskov, M. Angela Sasse, Manuel Oliveira:
Eliciting and modelling expertise for serious games in project management. Entertain. Comput. 2(2): 75-80 (2011) - [c62]Sven Laqua, Martina Angela Sasse, Steven Greenspan, Carrie Gates:
Do you know dis?: a user study of a knowledge discovery tool for organizations. CHI 2011: 2887-2896 - [c61]Martina Angela Sasse, Iacovos Kirlappos:
Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling. IFIPTM 2011: 9-12 - [c60]Ravi Jhawar, Philip Inglesant, Nicolas T. Courtois, Martina Angela Sasse:
Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication. NSS 2011: 81-88 - [c59]Philip Inglesant, Martina Angela Sasse:
Information security as organizational power: A framework for re-thinking security policies. STAST 2011: 9-16 - [c58]Miguel Malheiros, Charlene Jennett, William Seager, Martina Angela Sasse:
Trusting to Learn: Trust and Privacy Issues in Serious Games. TRUST 2011: 116-130 - [e4]Jonathan M. McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, M. Angela Sasse, Yolanta Beres:
Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings. Lecture Notes in Computer Science 6740, Springer 2011, ISBN 978-3-642-21598-8 [contents] - 2010
- [j17]Martina Angela Sasse:
Not seeing the crime for the cameras? Commun. ACM 53(2): 22-25 (2010) - [c57]