


Остановите войну!
for scientists:


default search action
M. Angela Sasse
Martina Angela Sasse – Angela M. Sasse
Person information

- affiliation (since 2018): Ruhr University Bochum, Bochum, Germany
- affiliation: University College London (UCL), Department of Computer Science, London, UK
- affiliation: University of Birmingham, Birmingham, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c123]Jan H. Klemmer
, Marco Gutfleisch
, Christian Stransky
, Yasemin Acar
, M. Angela Sasse
, Sascha Fahl
:
"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. CCS 2023: 2740-2754 - [c122]Franziska Herbert
, Steffen Becker
, Leonie Schaewitz
, Jonas Hielscher
, Marvin Kowalewski
, M. Angela Sasse
, Yasemin Acar
, Markus Dürmuth
:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CHI 2023: 582:1-582:23 - [c121]Ahmet Erinola, Annalina Buckmann, Jennifer Friedauer, Asli Yardim, M. Angela Sasse:
"As Usual, I Needed Assistance of a Seeing Person": Experiences and Challenges of People with Disabilities and Authentication Methods. EuroS&P Workshops 2023: 575-593 - [c120]Uta Menges
, Jonas Hielscher
, Laura Kocksch
, Annette Kluge
, M. Angela Sasse
:
Caring Not Scaring - An Evaluation of a Workshop to Train Apprentices as Security Champions. EuroUSEC 2023: 237-252 - [c119]Marco Gutfleisch
, Markus Schöps
, Stefan Albert Horstmann
, Daniel Wichmann
, M. Angela Sasse
:
Security Champions Without Support: Results from a Case Study with OWASP SAMM in a Large-Scale E-Commerce Enterprise. EuroUSEC 2023: 260-276 - [c118]Jonas Hielscher, Markus Schöps, Uta Menges, Marco Gutfleisch, Mirko Helbling, M. Angela Sasse:
Lacking the Tools and Support to Fix Friction: Results from an Interview Study with Security Managers. SOUPS 2023: 131-150 - [c117]Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse:
"Employees Who Don't Accept the Time Security Takes Are Not Aware Enough": The CISO View of Human-Centred Security. USENIX Security Symposium 2023: 2311-2328 - [c116]Lina Brunken, Annalina Buckmann, Jonas Hielscher, M. Angela Sasse:
"To Do This Properly, You Need More Resources": The Hidden Costs of Introducing Simulated Phishing Campaigns. USENIX Security Symposium 2023: 4105-4122 - [e8]Sokratis K. Katsikas
, Frédéric Cuppens
, Christos Kalloniatis
, John Mylopoulos, Frank Pallas
, Jörg Pohle
, M. Angela Sasse
, Habtamu Abie
, Silvio Ranise
, Luca Verderame
, Enrico Cambiaso
, Jorge Maestre Vidal
, Marco Antonio Sotelo Monge
, Massimiliano Albanese
, Basel Katt
, Sandeep Pirbhulal
, Ankur Shukla
:
Computer Security. ESORICS 2022 International Workshops - CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13785, Springer 2023, ISBN 978-3-031-25459-8 [contents] - [i11]Jan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl:
"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. CoRR abs/2309.00744 (2023) - 2022
- [c115]M. Angela Sasse, Jonas Hielscher, Jennifer Friedauer, Annalina Buckmann:
Rebooting IT Security Awareness - How Organisations Can Encourage and Sustain Secure Behaviours. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 248-265 - [c114]Marco Gutfleisch, Markus Schöps, Jonas Hielscher
, Mary Cheney, Sibel Sayin, Nathalie Schuhmacher, Ali Mohamad, M. Angela Sasse:
Caring About IoT-Security - An Interview Study in the Healthcare Sector. EuroUSEC 2022: 202-215 - [c113]Marco Gutfleisch, Markus Schöps, Sibel Sayin, Frederic Wende, Martina Angela Sasse:
Putting Security on the Table: The Digitalisation of Security Tabletop Games and its Challenging Aftertaste. ICSE (SEET) 2022: 217-222 - [c112]Peter Mayer, Damian Poddebniak, Konstantin Fischer, Marcus Brinkmann, Juraj Somorovsky, M. Angela Sasse, Sebastian Schinzel, Melanie Volkamer:
"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks. SOUPS @ USENIX Security Symposium 2022: 77-96 - [c111]Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse, Sascha Fahl:
How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study. SP 2022: 893-910 - [e7]Sokratis K. Katsikas
, Costas Lambrinoudakis
, Nora Cuppens
, John Mylopoulos
, Christos Kalloniatis
, Weizhi Meng
, Steven Furnell
, Frank Pallas
, Jörg Pohle, M. Angela Sasse
, Habtamu Abie
, Silvio Ranise
, Luca Verderame
, Enrico Cambiaso
, Jorge Maestre Vidal
, Marco Antonio Sotelo Monge
:
Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13106, Springer 2022, ISBN 978-3-030-95483-3 [contents] - [i10]Martin Ruskov
, Paul Ekblom, M. Angela Sasse:
Getting Users Smart Quick about Security: Results from 90 Minutes of Using a Persuasive Toolkit for Facilitating Information Security Problem Solving by Non-Professionals. CoRR abs/2209.02420 (2022) - [i9]Franziska Herbert, Steffen Becker
, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth
:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CoRR abs/2212.10382 (2022) - [i8]Franziska Herbert, Steffen Becker
, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Leonie Schaewitz, Jennifer Friedauer, Yasemin Acar, Markus Dürmuth, M. Angela Sasse:
Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies. CoRR abs/2212.12964 (2022) - 2021
- [c110]Uta Menges
, Jonas Hielscher
, Annalina Buckmann
, Annette Kluge
, M. Angela Sasse
, Imogen Verret:
Why IT Security Needs Therapy. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 335-356 - [c109]Marco Gutfleisch, Maximilian Peiffer
, Selim Erk, Martina Angela Sasse:
Microsoft Office Macro Warnings: A Design Comedy of Errors with Tragic Security Consequences. EuroUSEC 2021: 9-22 - [c108]Leonie Schaewitz, David Lakotta, M. Angela Sasse, Nikol Rummel
:
Peeking Into the Black Box: Towards Understanding User Understanding of E2EE. EuroUSEC 2021: 129-140 - [c107]Jonas Hielscher
, Annette Kluge
, Uta Menges
, M. Angela Sasse:
"Taking out the Trash": Why Security Behavior Change requires Intentional Forgetting. NSPW 2021: 108-122 - [c106]Leonie Schaewitz
, Cedric A. Lohmann
, Konstantin Fischer, M. Angela Sasse
:
Bringing Crypto Knowledge to School: Examining and Improving Junior High School Students' Security Assumptions About Encrypted Chat Apps. STAST 2021: 43-64 - 2020
- [j33]Melanie Volkamer, Martina Angela Sasse, Franziska Boehm:
Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness. Datenschutz und Datensicherheit 44(8): 518-521 (2020) - [j32]Charles Weir
, Ingolf Becker
, James Noble
, Lynne Blair
, M. Angela Sasse
, Awais Rashid
:
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers. Softw. Pract. Exp. 50(3): 275-298 (2020) - [c105]Stefan Schneegass, M. Angela Sasse, Florian Alt
, Daniel Vogel:
Authentication Beyond Desktops and Smartphones: Novel Approaches for Smart Devices and Environments. CHI Extended Abstracts 2020: 1-6 - [c104]Melanie Volkamer, Martina Angela Sasse, Franziska Boehm:
Analysing Simulated Phishing Campaigns for Staff. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 312-328 - [c103]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. ICICS 2020: 223-242 - [e6]Sokratis K. Katsikas
, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis
, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas
, Jörg Pohle, M. Angela Sasse
, Weizhi Meng
, Steven Furnell
, Joaquín García-Alfaro
:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5 [contents] - [e5]Ioana Boureanu
, Constantin Catalin Dragan
, Mark Manulis
, Thanassis Giannetsos
, Christoforos Dadoyan
, Panagiotis Gouvas, Roger A. Hallman
, Shujun Li, Victor Chang, Frank Pallas
, Jörg Pohle, Angela M. Sasse
:
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12580, Springer 2020, ISBN 978-3-030-66503-6 [contents] - [i7]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes affecting user decision to adopt a Virtual Private Network (VPN) app. CoRR abs/2008.06813 (2020)
2010 – 2019
- 2019
- [j31]Astrid Wichmann
, M. Angela Sasse, Christof Paar:
IT-Sicherheit ist mehr als Technik. Datenschutz und Datensicherheit 43(11): 673-674 (2019) - [c102]Albese Demjaha, Tristan Caulfield
, M. Angela Sasse, David J. Pym:
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes. EuroS&P Workshops 2019: 192-201 - [c101]Charles Weir
, Ingolf Becker, James Noble
, Lynne Blair, M. Angela Sasse, Awais Rashid:
Interventions for software security: creating a lightweight program of assurance techniques for developers. ICSE (SEIP) 2019: 41-50 - [c100]Thomas Cattermole, Simon Docherty, David J. Pym, M. Angela Sasse:
Asset-Oriented Access Control: Towards a New IoT Framework. IOT 2019: 31:1-31:4 - [c99]Tristan Caulfield
, Jonathan M. Spring, M. Angela Sasse:
Why Jenny can't figure out which of these messages is a covert information operation. NSPW 2019: 118-128 - [c98]Nissy Sombatruang, Lucky Onwuzurike, M. Angela Sasse, Michelle Baddeley
:
Factors influencing users to use unsecured wi-fi networks: evidence in the wild. WiSec 2019: 203-213 - [i6]Maria Bada, Angela M. Sasse, Jason R. C. Nurse:
Cyber Security Awareness Campaigns: Why do they fail to change behaviour? CoRR abs/1901.02672 (2019) - 2018
- [j30]Panagiotis Andriotis
, Gianluca Stringhini, Martina Angela Sasse:
Studying users' adaptation to Android's run-time fine-grained access control system. J. Inf. Secur. Appl. 40: 31-43 (2018) - [j29]Mark Warner
, Andreas Gutmann, M. Angela Sasse, Ann Blandford:
Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr. Proc. ACM Hum. Comput. Interact. 2(CSCW): 181:1-181:22 (2018) - [c97]Nissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley
, Daisuke Miyamoto:
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. PST 2018: 1-11 - [c96]Charles Weir, Lynne Blair, Ingolf Becker, M. Angela Sasse, James Noble
:
Light-Touch Interventions to Improve Software Development Security. SecDev 2018: 85-93 - [c95]Ingolf Becker, Simon Parkin, M. Angela Sasse:
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength. USENIX Security Symposium 2018: 239-253 - 2017
- [j28]Ingolf Becker
, Alice Hutchings
, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch
, M. Angela Sasse, Gianluca Stringhini:
International comparison of bank fraud reimbursement: customer perceptions and contractual terms. J. Cybersecur. 3(2): 109-125 (2017) - [c94]Steve Dodier-Lazaro, Ingolf Becker, Jens Krinke, M. Angela Sasse:
"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones. HCI (22) 2017: 25-44 - [c93]Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith:
Obstacles to the Adoption of Secure Communication Tools. IEEE Symposium on Security and Privacy 2017: 137-153 - [c92]Monica T. Whitty
, Matthew Edwards
, Michael Levi, Claudia Peersman, Awais Rashid
, M. Angela Sasse, Tom Sorell, Gianluca Stringhini:
Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF). WWW (Companion Volume) 2017: 1311-1314 - 2016
- [j27]M. Angela Sasse, Matthew Smith:
The Security-Usability Tradeoff Myth [Guest editors' introduction]. IEEE Secur. Priv. 14(5): 11-13 (2016) - [j26]Deanna D. Caputo, Shari Lawrence Pfleeger, M. Angela Sasse, Paul Ammann, Jeff Offutt, Lin Deng
:
Barriers to Usable Security? Three Organizational Case Studies. IEEE Secur. Priv. 14(5): 22-32 (2016) - [j25]M. Angela Sasse, Matthew Smith, Cormac Herley, Heather Lipford, Kami Vaniea:
Debunking Security-Usability Tradeoff Myths. IEEE Secur. Priv. 14(5): 33-39 (2016) - [c91]Johannes Sänger, Norman Hänsch, Brian Glass, Zinaida Benenson, Robert Landwirth, M. Angela Sasse:
Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces. CHI 2016: 3870-3882 - [c90]Steven J. Murdoch
, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). Financial Cryptography 2016: 600-608 - [c89]Kat Krol, Simon Parkin, M. Angela Sasse:
"I don't like putting my face on the Internet!": An acceptance study of face biometrics as a CAPTCHA replacement. ISBA 2016: 1-7 - [c88]Adam Beautement, Ingolf Becker, Simon Parkin, Kat Krol, M. Angela Sasse:
Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours. SOUPS 2016: 253-270 - [c87]Simon Parkin, Kat Krol, Ingolf Becker, M. Angela Sasse:
Applying Cognitive Control Modes to Identify Security Fatigue Hotspots. WSF@SOUPS 2016 - [c86]Nissy Sombatruang, M. Angela Sasse, Michelle Baddeley
:
Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions. STAST 2016: 61-72 - [c85]Panagiotis Andriotis
, Martina Angela Sasse, Gianluca Stringhini:
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. WIFS 2016: 1-6 - [i5]Jeunese A. Payne, Graeme Jenkinson, Frank Stajano, M. Angela Sasse, Max Spencer:
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens. CoRR abs/1605.03478 (2016) - [i4]Brian Glass, Graeme Jenkinson, Yuqi Liu, M. Angela Sasse, Frank Stajano:
The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions. CoRR abs/1607.03417 (2016) - 2015
- [j24]M. Angela Sasse:
Scaring and Bullying People into Security Won't Work. IEEE Secur. Priv. 13(3): 80-83 (2015) - [j23]Iacovos Kirlappos, Simon E. Parkin, M. Angela Sasse:
"Shadow security" as a tool for the learning organization. SIGCAS Comput. Soc. 45(1): 29-37 (2015) - [c84]Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Matthew Smith:
POSTER: Secure Chat for the Masses? User-centered Security to the Rescue. CCS 2015: 1623-1625 - [c83]Kat Krol, Constantinos Papanicolaou, Alexei Vernitski, Martina Angela Sasse:
"Too Taxing on the Mind!" Authentication Grids are not for Everyone. HCI (22) 2015: 71-82 - [c82]Odette Beris, Adam Beautement, M. Angela Sasse:
Employee Rule Breakers, Excuse Makers and Security Champions: : Mapping the risk perceptions and emotions that drive security behaviors. NSPW 2015: 73-84 - [c81]Simon E. Parkin, Samy Driss, Kat Krol, M. Angela Sasse:
Assessing the User Experience of Password Reset Policies in a University. PASSWORDS 2015: 21-38 - [c80]Brian Glass, Michelle Baddeley, M. Angela Sasse:
Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty. WEIS 2015 - [i3]Kat Krol, Eleni Philippou, Emiliano De Cristofaro, Martina Angela Sasse:
"They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking. CoRR abs/1501.04434 (2015) - 2014
- [j22]Martina Angela Sasse, Charles C. Palmer:
Protecting You. IEEE Secur. Priv. 12(1): 11-13 (2014) - [j21]Martina Angela Sasse, Charles C. Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash
, L. Jean Camp:
Helping You Protect You. IEEE Secur. Priv. 12(1): 39-42 (2014) - [c79]Iacovos Kirlappos, Martina Angela Sasse:
What Usable Security Really Means: Trusting and Engaging Users. HCI (24) 2014: 69-78 - [c78]Martina Angela Sasse, Michelle Steves, Kat Krol, Dana Chisnell:
The Great Authentication Fatigue - And How to Overcome It. HCI (19) 2014: 228-239 - [c77]Anthony Morton, Martina Angela Sasse:
Desperately seeking assurances: Segmenting users by their information-seeking preferences. PST 2014: 102-111 - [c76]Chris Porter, Emmanuel Letier, Martina Angela Sasse:
Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback. RE 2014: 374-383 - [p5]Martin Ruskov
, Paul Ekblom
, M. Angela Sasse:
Towards a Simulation of Information Security Behaviour in Organisations. Cyberpatterns 2014: 177-184 - [i2]Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela Sasse:
Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports 4(12): 1-28 (2014) - 2013
- [j20]Debi Ashenden
, M. Angela Sasse:
CISOs and organisational culture: Their own worst enemy? Comput. Secur. 39: 396-405 (2013) - [c75]Sacha Brostoff, Charlene Jennett, Miguel Malheiros, Martina Angela Sasse:
Federated identity to access e-government services: are citizens ready for this? Digital Identity Management 2013: 97-108 - [c74]Steffen Bartsch, Martina Angela Sasse:
How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization. ECIS 2013: 53 - [c73]Iacovos Kirlappos, Adam Beautement, Martina Angela Sasse:
"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents. Financial Cryptography Workshops 2013: 70-82 - [c72]Michael Huth, Jim Huan-Pu Kuo, M. Angela Sasse, Iacovos Kirlappos:
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent. HCI (27) 2013: 246-255 - [c71]Martina Angela Sasse:
"Technology Should Be Smarter Than This!": A Vision for Overcoming the Great Authentication Fatigue. Secure Data Management 2013: 33-36 - [c70]Miguel Malheiros, Sören Preibusch, Martina Angela Sasse:
"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure. TRUST 2013: 250-266 - [p4]Miguel Malheiros, Sacha Brostoff, Charlene Jennett, M. Angela Sasse:
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application. The Economics of Information Security and Privacy 2013: 237-261 - [i1]Alessandro Acquisti, Ioannis Krontiris, Marc Langheinrich, Martina Angela Sasse:
'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312). Dagstuhl Reports 3(7): 74-107 (2013) - 2012
- [j19]Iacovos Kirlappos, Martina Angela Sasse:
Security Education against Phishing: A Modest Proposal for a Major Rethink. IEEE Secur. Priv. 10(2): 24-32 (2012) - [c69]Nicolette Conti, Charlene Jennett, Jose Maestre, Martina Angela Sasse:
When did my mobile turn into a 'sellphone'?: a study of consumer responses to tailored smartphone ads. BCS HCI 2012: 215-220 - [c68]Miguel Malheiros, Charlene Jennett, Snehalee Patel, Sacha Brostoff, Martina Angela Sasse:
Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising. CHI 2012: 579-588 - [c67]Kat Krol, Matthew Moroz, Martina Angela Sasse:
Don't work. Can't work? Why it's time to rethink security warnings. CRiSIS 2012: 1-8 - [c66]Anthony Morton, Martina Angela Sasse:
Privacy is a process, not a PET: a theory for effective privacy practice. NSPW 2012: 87-104 - [c65]Steffen Bartsch, Martina Angela Sasse:
Guiding decisions on authorization policies: a participatory approach to decision support. SAC 2012: 1502-1507 - [c64]Iacovos Kirlappos, Martina Angela Sasse, Nigel Harvey:
Why Trust Seals Don't Work: A Study of User Perceptions and Behavior. TRUST 2012: 308-324 - [c63]Miguel Malheiros, Sacha Brostoff, Charlene Jennett, M. Angela Sasse:
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application. WEIS 2012 - [p3]Charlene Jennett, Miguel Malheiros, Sacha Brostoff, Martina Angela Sasse:
Privacy for Loan Applicants Versus Predictive Power for Loan Providers: Is It Possible to Bridge the Gap? European Data Protection 2012: 35-51 - [p2]Christian W. Probst
, Martina Angela Sasse, Wolter Pieters, Trajce Dimkov, Erik Luysterborg, Michel Arnaud:
Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider. European Data Protection 2012: 251-265 - 2011
- [j18]William Seager, Martin Ruskov
, M. Angela Sasse, Manuel Oliveira:
Eliciting and modelling expertise for serious games in project management. Entertain. Comput. 2(2): 75-80 (2011) - [c62]Sven Laqua
, Martina Angela Sasse, Steven Greenspan, Carrie Gates:
Do you know dis?: a user study of a knowledge discovery tool for organizations. CHI 2011: 2887-2896 - [c61]Martina Angela Sasse, Iacovos Kirlappos:
Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling. IFIPTM 2011: 9-12 - [c60]Ravi Jhawar, Philip Inglesant, Nicolas T. Courtois, Martina Angela Sasse:
Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication. NSS 2011: 81-88 - [c59]Philip Inglesant, Martina Angela Sasse:
Information security as organizational power: A framework for re-thinking security policies. STAST 2011: 9-16 - [c58]Miguel Malheiros, Charlene Jennett, William Seager, Martina Angela Sasse:
Trusting to Learn: Trust and Privacy Issues in Serious Games. TRUST 2011: 116-130 - [e4]Jonathan M. McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, M. Angela Sasse, Yolanta Beres:
Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings. Lecture Notes in Computer Science 6740, Springer 2011, ISBN 978-3-642-21598-8 [contents] - 2010
- [j17]Martina Angela Sasse:
Not seeing the crime for the cameras? Commun. ACM 53(2): 22-25 (2010) - [c57]Sacha Brostoff, Philip Inglesant, Martina Angela Sasse:
Evaluating the usability and security of a graphical one-time PIN system. BCS HCI 2010: 88-97 - [c56]Philip Inglesant, Martina Angela Sasse:
The true cost of unusable password policies: password use in the wild. CHI 2010: 383-392 - [c55]Simon E. Parkin, Aad P. A. van Moorsel, Philip Inglesant, Martina Angela Sasse:
A stealth approach to usable security: helping IT security managers to identify workable security solutions. NSPW 2010: 33-50
2000 – 2009
- 2009
- [j16]Ivan Flechais, Martina Angela Sasse:
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science. Int. J. Hum. Comput. Stud. 67(4): 281-296 (2009) - [j15]Hendrik Knoche
, Martina Angela Sasse:
The big picture on small screens delivering acceptable video quality in mobile TV. ACM Trans. Multim. Comput. Commun. Appl. 5(3): 20:1-20:27 (2009) - [c54]Sven Laqua, Martina Angela Sasse:
Exploring blog spaces: a study of blog reading experiences using dynamic contextual displays. BCS HCI 2009: 252-261 - [c53]Martina Angela Sasse, Clare-Marie Karat, Roy A. Maxion:
Designing and evaluating usable security and privacy technology. SOUPS 2009 - [p1]Adam Beautement, Robert Coles, Jonathan Griffin, Christos Ioannidis, Brian Monahan, David J. Pym, M. Angela Sasse, Mike Wonham:
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. Managing Information Risk and the Economics of Security 2009: 141-163 - 2008
- [j14]Hendrik Knoche
, John D. McCarthy, Martina Angela Sasse:
How low can you go? The effect of low resolutions on shot types in mobile TV. Multim. Tools Appl. 36(1-2): 145-166 (2008) - [c52]