Serge Egelman
Serge Egelman
University of California, Berkeley / International Computer Science Institute (ICSI) / AppCensus
Verified email at - Homepage
Cited by
Cited by
Android Permissions: User Attention, Comprehension, and Behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
The effect of online privacy information on purchasing behavior: An experimental study
JY Tsai, S Egelman, L Cranor, A Acquisti
Information Systems Research 22 (2), 254-268, 2011
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, J Hong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
Crying Wolf: An Empirical Study of SSL Warning Effectiveness.
J Sunshine, S Egelman, H Almuhimedi, N Atri, LF Cranor
USENIX Security Symposium, 399-416, 2009
Phinding phish: Evaluating anti-phishing tools
Y Zhang, S Egelman, L Cranor, J Hong
Network and Distributed Systems Symposium (NDSS), 2006
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
AP Felt, S Egelman, D Wagner
Proceedings of the second ACM workshop on Security and privacy in …, 2012
Facebook and Privacy: It’s Complicated
M Johnson, S Egelman, SM Bellovin
Symposium on Usable Privacy and Security (SOUPS), 2012
Does my password go up to eleven?: the impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
It's no secret. measuring the security and reliability of authentication via “secret” questions
S Schechter, AJB Brush, S Egelman
2009 30th IEEE Symposium on Security and Privacy, 375-390, 2009
Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS)
S Egelman, E Peer
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
Android Permissions Remystified: A Field Study on Contextual Integrity.
P Wijesekera, A Baokar, A Hosseini, S Egelman, D Wagner, K Beznosov
USENIX Security Symposium, 499-514, 2015
Are You Ready to Lock?
S Egelman, S Jain, RS Portnoff, K Liao, S Consolvo, D Wagner
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Choice architecture and smartphone privacy: There’s a price for that
S Egelman, AP Felt, D Wagner
The Economics of Information Security and Privacy, 211-236, 2013
Timing is everything?: the effects of timing and placement of online privacy indicators
S Egelman, J Tsai, LF Cranor, A Acquisti
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
How to ask for permission
AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner
USENIX Workshop on Hot Topics in Security, 2012
The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens
M Harbach, A De Luca, S Egelman
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences
P Wijesekera, A Baokar, L Tsai, J Reardon, S Egelman, D Wagner, ...
2017 IEEE Symposium on Security and Privacy (SP), 1077-1093, 2017
It's not what you know, but who you know: a social approach to last-resort authentication
S Schechter, S Egelman, RW Reeder
Proceedings of the 27th international conference on Human factors in …, 2009
Oops, I did it again: mitigating repeated access control errors on facebook
S Egelman, A Oates, S Krishnamurthi
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20