• Publications
  • Influence
ACCessory: password inference using accelerometers on smartphones
TLDR
It is shown that accelerometer measurements can be used to extract 6-character passwords in as few as 4.5 trials (median) and unlike many other sensors found on smartphones, the accelerometer does not require special privileges to access on current smartphone OSes. Expand
The post that wasn't: exploring self-censorship on facebook
TLDR
The results from an 18-participant user study designed to explore self-censorship behavior as well as the subset of unshared content participants would have potentially shared if they could have specifically targeted desired audiences are reported. Expand
Self-Censorship on Facebook
TLDR
There is specific evidence supporting the theory that a user’s “perceived audience” lies at the heart of the issue: posts are censored more frequently than comments, with status updates and posts directed at groups censored most frequently of all sharing use cases investigated. Expand
CASA: context-aware scalable authentication
TLDR
The results suggest that location data has good potential as a passive factor, and that users can reduce up to 68% of active authentications when using an implementation of CASA, compared to always using fixed active authentication. Expand
The Effect of Social Influence on Security Sensitivity
TLDR
It was found that social processes played a major role in a large number of privacy and security-related behavior changes reported by the sample, probably because these processes were effective at raising security sensitivity. Expand
Toward supporting stories with procedurally generated game worlds
TLDR
This work presents an approach to procedurally generating, rendering, and making playable novel games based on a priori unknown story structures that couples player, designer, and algorithm to generate a novel game using preferences for game play style, general design aesthetics, and a novel story structure. Expand
Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation
TLDR
As social announcements drove more people to explore security features, more people who saw social announcements adopted those features, too, and among those who explored the promoted features, there was no difference in the adoption rate of those who viewed a social versus a non-social announcement. Expand
The Role of Social Influence in Security Feature Adoption
TLDR
The results suggest that social influence affects one's likelihood to adopt a security feature, but its effect varies based on the observability of the feature, the current feature adoption rate among a potential adopter's friends, and the number of distinct social circles from which those feature-adopting friends originate. Expand
Exploring capturable everyday memory for autobiographical authentication
TLDR
This work derived a formula for computing a confidence rating that the attempting authenticator is the user from a sequence of question-answer responses and tested the formula against five simulated adversaries based on plausible real-life counterparts. Expand
Expert and Non-Expert Attitudes towards (Secure) Instant Messaging
TLDR
It is suggested that peer influence is what primarily drives people to use a particular mobile IM, even for secure/private IMs, and that security and privacy play minor roles. Expand
...
1
2
3
...