default search action
Masooda N. Bashir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j6]Tanusree Sharma, Hunter A. Dyer, Masooda N. Bashir:
Enabling User-centered Privacy Controls for Mobile Applications: COVID-19 Perspective. ACM Trans. Internet Techn. 21(1): 26:1-26:24 (2021) - 2017
- [j5]Masooda N. Bashir, Colin Wee, Nasir D. Memon, Boyi Guo:
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool. Comput. Secur. 65: 153-165 (2017) - 2015
- [j4]Kevin Anthony Hoff, Masooda N. Bashir:
Trust in Automation: Integrating Empirical Evidence on Factors That Influence Trust. Hum. Factors 57(3): 407-434 (2015) - [j3]Masooda N. Bashir, April Lambert, Boyi Guo, Nasir D. Memon, Tzipora Halevi:
Cybersecurity Competitions: The Human Angle. IEEE Secur. Priv. 13(5): 74-79 (2015) - 2014
- [j2]Anthony Lang, Masooda N. Bashir, Roy H. Campbell, Lizanne DeStefano:
Developing a new digital forensics curriculum. Digit. Investig. 11(Supplement 2): S76-S84 (2014) - 2012
- [j1]Shari Lawrence Pfleeger, Marc Rogers, Masooda N. Bashir, Kelly Caine, Deanna D. Caputo, Michael Losavio, Salvatore J. Stolfo:
Does Profiling Make Us More Secure? IEEE Secur. Priv. 10(4): 10-15 (2012)
Conference and Workshop Papers
- 2024
- [c59]Liang Tang, Masooda N. Bashir:
A Comprehensive Analysis of Public Sentiment Towards ChatGPT's Privacy Implications. HCI (20) 2024: 276-284 - [c58]Liang Tang, Masooda N. Bashir:
Examining Trust's Influence on Autonomous Vehicle Perceptions. IV 2024: 667-673 - 2023
- [c57]Priscilla Ferronato, Liang Tang, Masooda N. Bashir:
The Influence of Situational Variables Toward Initial Trust Formation on Autonomous System. HCI (38) 2023: 70-89 - [c56]Liang Tang, Masooda N. Bashir:
Effects of Self-avatar Similarity on User Trusting Behavior in Virtual Reality Environment. HCI (47) 2023: 313-316 - [c55]Liang Tang, Masooda N. Bashir:
Exploring the Influence of Self-Avatar Similarity on Human-Robot Trust. RO-MAN 2023: 1593-1599 - [c54]Hsiao-Ying Huang, Soteris Demetriou, Muhammad Hassan, Güliz Seray Tuncay, Carl A. Gunter, Masooda N. Bashir:
Evaluating User Behavior in Smartphone Security: A Psychometric Perspective. SOUPS 2023: 509-524 - 2022
- [c53]Xinhui Hu, Masooda N. Bashir:
Toward Designing Trustworthy Autonomous Systems: Probing the Role of Humans' Ethical Perspectives. CSCWD 2022: 974-979 - [c52]Tian Wang, Carol Mullins Hayes, Chen Chen, Masooda N. Bashir:
An Analysis of Mobile Gaming Apps' Privacy Policies. GEM 2022: 1-6 - [c51]Tian Wang, Masooda N. Bashir:
Attitudes Towards the Use of COVID-19 Apps and Its Associated Factors. HCI (32) 2022: 492-501 - [c50]Tian Wang, Masooda N. Bashir:
An Analysis of Cloud Certifications' Performance on Privacy Protections. ICISSP 2022: 299-306 - [c49]Liang Tang, Priscilla Ferronato, Masooda N. Bashir:
Do Users' Values Influence Trust in Automation? ICHI 2022: 297-311 - 2021
- [c48]Tian Wang, Lin Guo, Masooda N. Bashir:
COVID -19 Apps and Privacy Protections from Users' Perspective. ASIST 2021: 357-365 - [c47]Tian Wang, Masooda N. Bashir:
Gaming Apps' and Social Media Partnership: A Privacy Perspective. HCI (27) 2021: 475-487 - [c46]Tian Wang, Lin Guo, Masooda N. Bashir:
Assessing Individual Differences in Coping Mechanisms during the COVID-19 Pandemic. ICMHI 2021: 215-219 - [c45]Tian Wang, Ian S. Brooks, Masooda N. Bashir:
Public Reaction on Social Media During COVID-19: A Comparison Between Twitter and Weibo. SAI (1) 2021: 612-625 - [c44]Tanusree Sharma, Hunter A. Dyer, Roy H. Campbell, Masooda N. Bashir:
Mapping Risk Assessment Strategy for COVID-19 Mobile Apps' Vulnerabilities. SAI (1) 2021: 1082-1096 - 2020
- [c43]Tanusree Sharma, Tian Wang, Carlo Di Giulio, Masooda N. Bashir:
Towards Inclusive Privacy Protections in the Cloud. ACNS Workshops 2020: 337-359 - [c42]John Christian Bambenek, Masooda N. Bashir:
Ethics, Economics, and Ransomware: How Human Decisions Grow the Threat. AHFE (19) 2020: 17-22 - [c41]Priscilla Ferronato, Masooda N. Bashir:
Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems? AHFE (19) 2020: 23-29 - [c40]Tanusree Sharma, Masooda N. Bashir:
An Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited. AHFE (19) 2020: 49-55 - [c39]Tian Wang, Masooda N. Bashir:
A Study of Social Media Behaviors and Mental Health Wellbeing from a Privacy Perspective. AHFE (13) 2020: 137-144 - [c38]Qingxiao Zheng, Masooda N. Bashir:
Investigating the Differences in Privacy News Based on Grounded Theory. AHFE (15) 2020: 528-535 - [c37]Tian Wang, Masooda N. Bashir:
Privacy considerations when predicting mental health using social media. ASIST 2020 - [c36]Priscilla Ferronato, Masooda N. Bashir:
An Examination of Dispositional Trust in Human and Autonomous System Interactions. HCI (3) 2020: 420-435 - [c35]Tanusree Sharma, Masooda N. Bashir:
Privacy Apps for Smartphones: An Assessment of Users' Preferences and Limitations. HCI (30) 2020: 533-546 - [c34]Tanusree Sharma, Tian Wang, Masooda N. Bashir:
Advocating for Users' Privacy Protections: A Case study of COVID-19 apps. MobileHCI (Extended Abstracts) 2020: 22:1-22:4 - 2019
- [c33]Tanisha Afnan, Hsiao-Ying Huang, Maria Sclafani, Masooda N. Bashir:
Putting a price on social movements: A case study of #metoo on instagram. ASIST 2019: 1-9 - [c32]Hsiao-Ying Huang, Michael B. Twidale, Masooda N. Bashir:
'If You Agree with Me, Do I Trust You?': An Examination of Human-Agent Trust from a Psychological Perspective. IntelliSys (2) 2019: 994-1013 - [c31]Tanusree Sharma, John Christian Bambenek, Masooda N. Bashir:
Preserving Privacy in Cyber-physical-social Systems: An Anonymity and Access Control Approach. CPSS@IOT 2019: 16-21 - [c30]Shreya Udhani, Alexander Withers, Masooda N. Bashir:
Human vs Bots: Detecting Human Attacks in a Honeypot Environment. ISDFS 2019: 1-6 - 2018
- [c29]Hsiao-Ying Huang, Masooda N. Bashir:
Surfing safely: Examining older adults' online privacy protection behaviors. ASIST 2018: 188-197 - [c28]Jane Blanken-Webb, Imani Palmer, Nicholas C. Burbules, Roy H. Campbell, Masooda N. Bashir:
A Case Study-based Cybersecurity Ethics Curriculum. ASE @ USENIX Security Symposium 2018 - 2017
- [c27]Carlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir:
Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security? CLOUD 2017: 50-57 - [c26]Aseel Addawood, Yixin Zou, Masooda N. Bashir:
Users' Attitudes Towards the "Going Dark" Debate. AHFE (9) 2017: 296-307 - [c25]Beth Strickland Bloch, Masooda N. Bashir:
Privacy and Security of Cardiovascular Implantable Electronic Devices: Applying a Contextual Integrity Analysis. AHFE (6) 2017: 569-580 - [c24]Carlo Di Giulio, Charles A. Kamhoua, Roy H. Campbell, Read Sprabery, Kevin A. Kwiat, Masooda N. Bashir:
IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers. CCGrid 2017: 1090-1099 - [c23]Hsiao-Ying Huang, Masooda N. Bashir:
Personal Influences on Dynamic Trust Formation in Human-Agent Interaction. HAI 2017: 233-243 - [c22]Hsiao-Ying Huang, Masooda N. Bashir:
Android App Permission and Users' Adoption: A Case Study of Mental Health Application. HCI (22) 2017: 110-122 - [c21]Carlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir:
Cloud security certifications: a comparison to improve cloud service provider security. ICC 2017: 120:1-120:12 - [c20]Mohammad A. Noureddine, Andrew Marturano, Ken Keefe, Masooda N. Bashir, William H. Sanders:
Accounting for the Human User in Predictive Security Models. PRDC 2017: 329-338 - [c19]Aseel Addawood, Jodi Schneider, Masooda N. Bashir:
Stance Classification of Twitter Debates: The Encryption Debate as A Use Case. SMSociety 2017: 2:1-2:10 - 2016
- [c18]Aseel Addawood, Masooda N. Bashir:
"What Is Your Evidence?" A Study of Controversial Topics on Social Media. ArgMining@ACL 2016 - [c17]Hsiao-Ying Huang, Masooda N. Bashir:
The onion router: Understanding a privacy enhancing technology community. ASIST 2016: 1-10 - [c16]Hsiao-Ying Huang, Masooda N. Bashir:
Users' perspective on designing inclusive privacy-enhancing indicators. PST 2016: 600-607 - [c15]Masooda N. Bashir, Beth Strickland, Jeremiah Bohr:
What Motivates People to Use Bitcoin? SocInfo (2) 2016: 347-367 - [c14]Colin Wee, Masooda N. Bashir, Nasir D. Memon:
The Cybersecurity Competition Experience: Perceptions from Cybersecurity Workers. WSIW@SOUPS 2016 - [c13]Jian Ming Colin Wee, Masooda N. Bashir, Nasir D. Memon:
Self-Efficacy in Cybersecurity Tasks and Its Relationship with Cybersecurity Competition and Work-Related Outcomes. ASE @ USENIX Security Symposium 2016 - 2015
- [c12]Masooda N. Bashir, Carol Hayes, April Lambert, Jay P. Kesan:
Online privacy and informed consent: The dilemma of information asymmetry. ASIST 2015: 1-10 - [c11]Hsiao-Ying Huang, Masooda N. Bashir:
Direct-to-Consumer genetic testing: Contextual privacy predicament. ASIST 2015: 1-10 - [c10]April Lambert, Michelle Parker, Masooda N. Bashir:
Library patron privacy in jeopardy an analysis of the privacy policies of digital content vendors. ASIST 2015: 1-9 - [c9]Hsiao-Ying Huang, Masooda N. Bashir:
Examining the Gender Gap in Information Assurance: A Study of Psychological Factors. HCI (27) 2015: 117-122 - [c8]Mohammad A. Noureddine, Ken Keefe, William H. Sanders, Masooda N. Bashir:
Quantitative security metrics with human in the loop. HotSoS 2015: 21:1-21:2 - [c7]Imani Palmer, Elaine Wood, Stefan Nagy, Gabriela García, Masooda N. Bashir, Roy H. Campbell:
Digital Forensics Education: A Multidisciplinary Curriculum Model. ICDF2C 2015: 3-15 - [c6]Karolina Alvarez, Masooda N. Bashir:
Exploring the Effectiveness of Digital Forensics Tools on the Sony PlayStation Vita. ICDF2C 2015: 200-206 - [c5]Hsiao-Ying Huang, Masooda N. Bashir:
Is privacy a human right? An empirical examination in a global context. PST 2015: 77-84 - [c4]Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda N. Bashir, Konstantin Beznosov:
On the Memorability of System-generated PINs: Can Chunking Help? SOUPS 2015: 197-209 - 2014
- [c3]Ivan Hernandez, Masooda N. Bashir, Gahyun Jeon, Jeremiah Bohr:
Are Bitcoin Users Less Sociable? An Analysis of Users' Language and Social Connections on Twitter. HCI (27) 2014: 26-31 - [c2]Jeremiah Bohr, Masooda N. Bashir:
Who Uses Bitcoin? An exploration of the Bitcoin community. PST 2014: 94-101 - 2013
- [c1]Kevin Hoff, Masooda N. Bashir:
A theoretical model for trust in automated systems. CHI Extended Abstracts 2013: 115-120
Informal and Other Publications
- 2022
- [i3]Tian Wang, Masooda N. Bashir:
A Privacy Glossary for Cloud Computing. CoRR abs/2206.06457 (2022) - 2020
- [i2]Hsiao-Ying Huang, Soteris Demetriou, Rini Banerjee, Güliz Seray Tuncay, Carl A. Gunter, Masooda N. Bashir:
Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security. CoRR abs/2007.01721 (2020) - [i1]Tanusree Sharma, Masooda N. Bashir:
Are PETs (Privacy Enhancing Technologies) Giving Protection for Smartphones? - A Case Study. CoRR abs/2007.04444 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint