
M. Angela Sasse
Martina Angela Sasse – Angela M. Sasse
Person information
- affiliation (since 2018): Ruhr University Bochum, Bochum, Germany
- affiliation: University College London (UCL), Department of Computer Science, London, UK
- affiliation: University of Birmingham, Birmingham, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j33]Melanie Volkamer, Martina Angela Sasse, Franziska Boehm:
Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness. Datenschutz und Datensicherheit 44(8): 518-521 (2020) - [j32]Charles Weir
, Ingolf Becker
, James Noble
, Lynne Blair
, M. Angela Sasse
, Awais Rashid
:
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers. Softw. Pract. Exp. 50(3): 275-298 (2020) - [c104]Melanie Volkamer, Martina Angela Sasse, Franziska Boehm:
Analysing Simulated Phishing Campaigns for Staff. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 312-328 - [c103]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. ICICS 2020: 223-242 - [e6]Sokratis K. Katsikas
, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis
, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas
, Jörg Pohle, M. Angela Sasse
, Weizhi Meng
, Steven Furnell
, Joaquín García-Alfaro
:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5 [contents] - [e5]Ioana Boureanu
, Constantin Catalin Dragan
, Mark Manulis
, Thanassis Giannetsos
, Christoforos Dadoyan
, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas
, Jörg Pohle, Angela M. Sasse
:
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12580, Springer 2020, ISBN 978-3-030-66503-6 [contents] - [i7]Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley:
Attributes affecting user decision to adopt a Virtual Private Network (VPN) app. CoRR abs/2008.06813 (2020)
2010 – 2019
- 2019
- [j31]Astrid Wichmann, M. Angela Sasse, Christof Paar:
IT-Sicherheit ist mehr als Technik. Datenschutz und Datensicherheit 43(11): 673-674 (2019) - [c102]Albese Demjaha, Tristan Caulfield, M. Angela Sasse, David J. Pym:
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes. EuroS&P Workshops 2019: 192-201 - [c101]Charles Weir
, Ingolf Becker, James Noble
, Lynne Blair, M. Angela Sasse, Awais Rashid:
Interventions for software security: creating a lightweight program of assurance techniques for developers. ICSE (SEIP) 2019: 41-50 - [c100]Thomas Cattermole, Simon Docherty, David J. Pym, M. Angela Sasse:
Asset-Oriented Access Control: Towards a New IoT Framework. IOT 2019: 31:1-31:4 - [c99]Tristan Caulfield, Jonathan M. Spring, M. Angela Sasse:
Why Jenny can't figure out which of these messages is a covert information operation. NSPW 2019: 118-128 - [c98]Nissy Sombatruang, Lucky Onwuzurike, M. Angela Sasse, Michelle Baddeley
:
Factors influencing users to use unsecured wi-fi networks: evidence in the wild. WiSec 2019: 203-213 - [i6]Maria Bada, Angela M. Sasse, Jason R. C. Nurse:
Cyber Security Awareness Campaigns: Why do they fail to change behaviour? CoRR abs/1901.02672 (2019) - 2018
- [j30]Panagiotis Andriotis
, Gianluca Stringhini, Martina Angela Sasse:
Studying users' adaptation to Android's run-time fine-grained access control system. J. Inf. Secur. Appl. 40: 31-43 (2018) - [j29]Mark Warner
, Andreas Gutmann, M. Angela Sasse, Ann Blandford:
Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr. Proc. ACM Hum. Comput. Interact. 2(CSCW): 181:1-181:22 (2018) - [c97]Nissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley
, Daisuke Miyamoto:
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. PST 2018: 1-11 - [c96]Charles Weir, Lynne Blair, Ingolf Becker, M. Angela Sasse, James Noble
:
Light-Touch Interventions to Improve Software Development Security. SecDev 2018: 85-93 - [c95]Ingolf Becker, Simon Parkin, M. Angela Sasse:
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength. USENIX Security Symposium 2018: 239-253 - 2017
- [j28]Ingolf Becker
, Alice Hutchings
, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch, M. Angela Sasse, Gianluca Stringhini:
International comparison of bank fraud reimbursement: customer perceptions and contractual terms. J. Cybersecur. 3(2): 109-125 (2017) - [c94]Steve Dodier-Lazaro, Ingolf Becker, Jens Krinke, M. Angela Sasse:
"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones. HCI (22) 2017: 25-44 - [c93]Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith:
Obstacles to the Adoption of Secure Communication Tools. IEEE Symposium on Security and Privacy 2017: 137-153 - [c92]Monica T. Whitty
, Matthew Edwards
, Michael Levi, Claudia Peersman, Awais Rashid
, M. Angela Sasse, Tom Sorell, Gianluca Stringhini:
Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF). WWW (Companion Volume) 2017: 1311-1314 - 2016
- [j27]M. Angela Sasse, Matthew Smith:
The Security-Usability Tradeoff Myth [Guest editors' introduction]. IEEE Secur. Priv. 14(5): 11-13 (2016) - [j26]Deanna D. Caputo, Shari Lawrence Pfleeger, M. Angela Sasse, Paul Ammann, Jeff Offutt, Lin Deng
:
Barriers to Usable Security? Three Organizational Case Studies. IEEE Secur. Priv. 14(5): 22-32 (2016) - [j25]M. Angela Sasse, Matthew Smith, Cormac Herley, Heather Lipford, Kami Vaniea:
Debunking Security-Usability Tradeoff Myths. IEEE Secur. Priv. 14(5): 33-39 (2016) - [c91]Johannes Sänger, Norman Hänsch, Brian Glass, Zinaida Benenson, Robert Landwirth, M. Angela Sasse:
Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces. CHI 2016: 3870-3882 - [c90]Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). Financial Cryptography 2016: 600-608 - [c89]Kat Krol, Simon Parkin, M. Angela Sasse:
"I don't like putting my face on the Internet!": An acceptance study of face biometrics as a CAPTCHA replacement. ISBA 2016: 1-7 - [c88]Adam Beautement, Ingolf Becker, Simon Parkin, Kat Krol, M. Angela Sasse:
Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours. SOUPS 2016: 253-270 - [c87]Simon Parkin, Kat Krol, Ingolf Becker, M. Angela Sasse:
Applying Cognitive Control Modes to Identify Security Fatigue Hotspots. WSF@SOUPS 2016 - [c86]Nissy Sombatruang, M. Angela Sasse, Michelle Baddeley
:
Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions. STAST 2016: 61-72 - [c85]Panagiotis Andriotis
, Martina Angela Sasse, Gianluca Stringhini:
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. WIFS 2016: 1-6 - [i5]Jeunese A. Payne, Graeme Jenkinson, Frank Stajano, M. Angela Sasse, Max Spencer:
Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens. CoRR abs/1605.03478 (2016) - [i4]Brian Glass, Graeme Jenkinson, Yuqi Liu, M. Angela Sasse, Frank Stajano:
The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions. CoRR abs/1607.03417 (2016) - 2015
- [j24]M. Angela Sasse:
Scaring and Bullying People into Security Won't Work. IEEE Secur. Priv. 13(3): 80-83 (2015) - [j23]Iacovos Kirlappos, Simon E. Parkin, M. Angela Sasse:
"Shadow security" as a tool for the learning organization. SIGCAS Comput. Soc. 45(1): 29-37 (2015) - [c84]Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Matthew Smith:
POSTER: Secure Chat for the Masses? User-centered Security to the Rescue. CCS 2015: 1623-1625 - [c83]Kat Krol, Constantinos Papanicolaou, Alexei Vernitski, Martina Angela Sasse:
"Too Taxing on the Mind!" Authentication Grids are not for Everyone. HCI (22) 2015: 71-82 - [c82]Odette Beris, Adam Beautement, M. Angela Sasse:
Employee Rule Breakers, Excuse Makers and Security Champions: : Mapping the risk perceptions and emotions that drive security behaviors. NSPW 2015: 73-84 - [c81]Simon E. Parkin, Samy Driss, Kat Krol, M. Angela Sasse:
Assessing the User Experience of Password Reset Policies in a University. PASSWORDS 2015: 21-38 - [c80]Brian Glass, Michelle Baddeley, M. Angela Sasse:
Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty. WEIS 2015 - [i3]Kat Krol, Eleni Philippou, Emiliano De Cristofaro, Martina Angela Sasse:
"They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking. CoRR abs/1501.04434 (2015) - 2014
- [j22]Martina Angela Sasse, Charles C. Palmer:
Protecting You. IEEE Secur. Priv. 12(1): 11-13 (2014) - [j21]Martina Angela Sasse, Charles C. Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash, L. Jean Camp:
Helping You Protect You. IEEE Secur. Priv. 12(1): 39-42 (2014) - [c79]Iacovos Kirlappos, Martina Angela Sasse:
What Usable Security Really Means: Trusting and Engaging Users. HCI (24) 2014: 69-78 - [c78]Martina Angela Sasse, Michelle Steves, Kat Krol, Dana Chisnell:
The Great Authentication Fatigue - And How to Overcome It. HCI (19) 2014: 228-239 - [c77]Anthony Morton, Martina Angela Sasse:
Desperately seeking assurances: Segmenting users by their information-seeking preferences. PST 2014: 102-111 - [c76]Chris Porter, Emmanuel Letier, Martina Angela Sasse:
Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback. RE 2014: 374-383 - [p5]Martin Ruskov
, Paul Ekblom
, M. Angela Sasse:
Towards a Simulation of Information Security Behaviour in Organisations. Cyberpatterns 2014: 177-184 - [i2]Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela Sasse:
Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports 4(12): 1-28 (2014) - 2013
- [j20]Debi Ashenden
, M. Angela Sasse:
CISOs and organisational culture: Their own worst enemy? Comput. Secur. 39: 396-405 (2013) - [c75]Sacha Brostoff, Charlene Jennett, Miguel Malheiros, Martina Angela Sasse:
Federated identity to access e-government services: are citizens ready for this? Digital Identity Management 2013: 97-108 - [c74]Steffen Bartsch, Martina Angela Sasse:
How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization. ECIS 2013: 53 - [c73]Iacovos Kirlappos, Adam Beautement, Martina Angela Sasse:
"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents. Financial Cryptography Workshops 2013: 70-82 - [c72]Michael Huth, Jim Huan-Pu Kuo, M. Angela Sasse, Iacovos Kirlappos:
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent. HCI (27) 2013: 246-255 - [c71]Martina Angela Sasse:
"Technology Should Be Smarter Than This!": A Vision for Overcoming the Great Authentication Fatigue. Secure Data Management 2013: 33-36 - [c70]Miguel Malheiros, Sören Preibusch, Martina Angela Sasse:
"Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure. TRUST 2013: 250-266 - [p4]Miguel Malheiros, Sacha Brostoff, Charlene Jennett, M. Angela Sasse:
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application. The Economics of Information Security and Privacy 2013: 237-261 - [i1]Alessandro Acquisti, Ioannis Krontiris, Marc Langheinrich, Martina Angela Sasse:
'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312). Dagstuhl Reports 3(7): 74-107 (2013) - 2012
- [j19]Iacovos Kirlappos, Martina Angela Sasse:
Security Education against Phishing: A Modest Proposal for a Major Rethink. IEEE Secur. Priv. 10(2): 24-32 (2012) - [c69]Nicolette Conti, Charlene Jennett, Jose Maestre, Martina Angela Sasse:
When did my mobile turn into a 'sellphone'?: a study of consumer responses to tailored smartphone ads. BCS HCI 2012: 215-220 - [c68]Miguel Malheiros, Charlene Jennett, Snehalee Patel, Sacha Brostoff, Martina Angela Sasse:
Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising. CHI 2012: 579-588 - [c67]Kat Krol, Matthew Moroz, Martina Angela Sasse:
Don't work. Can't work? Why it's time to rethink security warnings. CRiSIS 2012: 1-8 - [c66]Anthony Morton, Martina Angela Sasse:
Privacy is a process, not a PET: a theory for effective privacy practice. NSPW 2012: 87-104 - [c65]Steffen Bartsch, Martina Angela Sasse:
Guiding decisions on authorization policies: a participatory approach to decision support. SAC 2012: 1502-1507 - [c64]Iacovos Kirlappos, Martina Angela Sasse, Nigel Harvey:
Why Trust Seals Don't Work: A Study of User Perceptions and Behavior. TRUST 2012: 308-324 - [c63]Miguel Malheiros, Sacha Brostoff, Charlene Jennett, M. Angela Sasse:
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application. WEIS 2012 - [p3]Charlene Jennett, Miguel Malheiros, Sacha Brostoff, Martina Angela Sasse:
Privacy for Loan Applicants Versus Predictive Power for Loan Providers: Is It Possible to Bridge the Gap? European Data Protection 2012: 35-51 - [p2]Christian W. Probst
, Martina Angela Sasse, Wolter Pieters, Trajce Dimkov, Erik Luysterborg, Michel Arnaud:
Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider. European Data Protection 2012: 251-265 - 2011
- [j18]William Seager, Martin Ruskov
, M. Angela Sasse, Manuel Oliveira:
Eliciting and modelling expertise for serious games in project management. Entertain. Comput. 2(2): 75-80 (2011) - [c62]Sven Laqua
, Martina Angela Sasse, Steven Greenspan, Carrie Gates:
Do you know dis?: a user study of a knowledge discovery tool for organizations. CHI 2011: 2887-2896 - [c61]Martina Angela Sasse, Iacovos Kirlappos:
Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling. IFIPTM 2011: 9-12 - [c60]Ravi Jhawar, Philip Inglesant, Nicolas T. Courtois, Martina Angela Sasse:
Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication. NSS 2011: 81-88 - [c59]Philip Inglesant, Martina Angela Sasse:
Information security as organizational power: A framework for re-thinking security policies. STAST 2011: 9-16 - [c58]Miguel Malheiros, Charlene Jennett, William Seager, Martina Angela Sasse:
Trusting to Learn: Trust and Privacy Issues in Serious Games. TRUST 2011: 116-130 - [e4]Jonathan M. McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, M. Angela Sasse, Yolanta Beres:
Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings. Lecture Notes in Computer Science 6740, Springer 2011, ISBN 978-3-642-21598-8 [contents] - 2010
- [j17]Martina Angela Sasse:
Not seeing the crime for the cameras? Commun. ACM 53(2): 22-25 (2010) - [c57]Sacha Brostoff, Philip Inglesant, Martina Angela Sasse:
Evaluating the usability and security of a graphical one-time PIN system. BCS HCI 2010: 88-97 - [c56]Philip Inglesant, Martina Angela Sasse:
The true cost of unusable password policies: password use in the wild. CHI 2010: 383-392 - [c55]Simon E. Parkin, Aad P. A. van Moorsel, Philip Inglesant, Martina Angela Sasse:
A stealth approach to usable security: helping IT security managers to identify workable security solutions. NSPW 2010: 33-50
2000 – 2009
- 2009
- [j16]Ivan Flechais, Martina Angela Sasse:
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science. Int. J. Hum. Comput. Stud. 67(4): 281-296 (2009) - [j15]Hendrik Knoche
, Martina Angela Sasse:
The big picture on small screens delivering acceptable video quality in mobile TV. ACM Trans. Multim. Comput. Commun. Appl. 5(3): 20:1-20:27 (2009) - [c54]Sven Laqua, Martina Angela Sasse:
Exploring blog spaces: a study of blog reading experiences using dynamic contextual displays. BCS HCI 2009: 252-261 - [c53]Martina Angela Sasse, Clare-Marie Karat, Roy A. Maxion:
Designing and evaluating usable security and privacy technology. SOUPS 2009 - [p1]Adam Beautement, Robert Coles, Jonathan Griffin, Christos Ioannidis, Brian Monahan, David J. Pym, M. Angela Sasse, Mike Wonham:
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. Managing Information Risk and the Economics of Security 2009: 141-163 - 2008
- [j14]Hendrik Knoche
, John D. McCarthy, Martina Angela Sasse:
How low can you go? The effect of low resolutions on shot types in mobile TV. Multim. Tools Appl. 36(1-2): 145-166 (2008) - [c52]Lidia Oshlyansky, Paul A. Cairns, M. Angela Sasse, Chandra Harrison:
The challenges faced by academia preparing students for industry: what we teach and what we do. BCS HCI (2) 2008: 203-204 - [c51]Hendrik Knoche
, Martina Angela Sasse:
The sweet spot: how people trade off size and definition on mobile devices. ACM Multimedia 2008: 21-30 - [c50]Hina Uttam Keval, Martina Angela Sasse:
To catch a thief - you need at least 8 frames per second: the impact of frame rates on user performance in a CCTV detection task. ACM Multimedia 2008: 941-944 - [c49]Adam Beautement, Martina Angela Sasse, Mike Wonham:
The compliance budget: managing security behaviour in organisations. NSPW 2008: 47-58 - [c48]Philip Inglesant, Martina Angela Sasse, David W. Chadwick
, Lei Lei Shi:
Expressions of expertness: the virtuous circle of natural language for access control policy specification. SOUPS 2008: 77-88 - [c47]Adam Beautement, Robert Coles, Jonathan Griffin, Christos Ioannidis, Brian Monahan, David J. Pym, M. Angela Sasse, Mike Wonham:
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. WEIS 2008 - 2007
- [j13]Martina Angela Sasse:
Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems. IEEE Secur. Priv. 5(3): 78-81 (2007) - [j12]Ivan Flechais, Cecilia Mascolo, Martina Angela Sasse:
Integrating security and usability into the requirements and design process. Int. J. Electron. Secur. Digit. Forensics 1(1): 12-26 (2007) - [c46]Philip Inglesant, Martina Angela Sasse:
Usability is the best policy: public policy and the lived experience of transport systems in London. BCS HCI (1) 2007: 35-44 - [c45]Sven Laqua, Shane Udaraka Bandara, Martina Angela Sasse:
GazeSpace: eye gaze controlled content spaces. BCS HCI (2) 2007: 55-58 - [c44]Sven Laqua, Nnamdi Ogbechie, Martina Angela Sasse:
Contextualizing the blogosphere: a comparison of traditional and novel user interfaces for the web. BCS HCI (2) 2007: 59-62 - [c43]Philip Bonhard, Martina Angela Sasse, Clare Harries:
"The devil you know knows best": how online recommendations can benefit from social networking. BCS HCI (1) 2007: 77-86 - [c42]Hendrik Knoche
, Marco Papaleo, Martina Angela Sasse, Alessandro Vanelli-Coralli
:
The kindest cut: enhancing the user experience of mobile tv through adequate zooming. ACM Multimedia 2007: 87-96 - 2006
- [c41]Philip Bonhard, Clare Harries, John D. McCarthy, Martina Angela Sasse:
Accounting for taste: using profile similarity to improve recommender systems. CHI 2006: 1057-1066 - [c40]Sven Laqua, Gemini Pate, Martina Angela Sasse:
Personalised Focus-Metaphor Interfaces: An Eye Tracking Study on User Confusion. Mensch & Computer 2006: 175-184 - [c39]Hendrik Knoche
, John D. McCarthy, Martina Angela Sasse:
Reading the fine print: the effect of text legibility on perceived video quality in mobile tv. ACM Multimedia 2006: 727-730 - 2005
- [j11]Jens Riegelsberger, Martina Angela Sasse, John D. McCarthy:
The mechanics of trust: A framework for research and design. Int. J. Hum. Comput. Stud. 62(3): 381-422 (2005) - [j10]Sacha Brostoff, Martina Angela Sasse, David W. Chadwick
, R. James Cunningham, Uche M. Mbanaso, Sassa Otenko:
'R-What?' Development of a role-based access control policy-writing tool for e-Scientists. Softw. Pract. Exp. 35(9): 835-856 (2005) - [c38]Philip Bonhard, M. Angela Sasse:
"I thought it was terrible and everyone else loved it" - A New Perspective for Effective Recommender System Design. BCS HCI 2005: 251-265 - [c37]Jens Riegelsberger, M. Angela Sasse, John D. McCarthy:
Rich Media, Poor Judgement? A Study of Media Effects on Users' Trust in Expertise. BCS HCI 2005: 267-284 - [c36]Jens Riegelsberger, Martina Angela Sasse, John D. McCarthy:
Do people trust their eyes more than ears?: media bias in detecting cues of expertise. CHI Extended Abstracts 2005: 1745-1748 - [c35]Jeremiah Scholl, Peter Parnes, John D. McCarthy, Martina Angela Sasse:
Designing a large-scale video chat application. ACM Multimedia 2005: 71-80 - [c34]Hendrik Knoche, John D. McCarthy, Martina Angela Sasse:
Can small be beautiful?: assessing image resolution requirements for mobile TV. ACM Multimedia 2005: 829-838 - [c33]Ivan Flechais, Jens Riegelsberger, Martina Angela Sasse:
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems. NSPW 2005: 33-41 - 2004
- [j9]Kenneth J. Crisler, Thea Turner, Andrew Aftelak, Michele Visciola, Axel Steinhage, Mikael Anneroth, Martin Rantzer, Bruno von Niman, M. Angela Sasse, Manfred Tscheligi, Satu Kalliokulju, Emanuele Dainesi, Antonella Zucchella
:
Considering the user in the wireless world. IEEE Commun. Mag. 42(9): 56-62 (2004) - [j8]Gillian May Wilson, Martina Angela Sasse:
From doing to being: getting closer to the user experience. Interact. Comput. 16(4): 697-705 (2004) - [c32]John D. McCarthy, Martina Angela Sasse, Jens Riegelsberger:
The Geometry of Web Search. BCS HCI 2004: 249-262 - [c31]John D. McCarthy, Martina Angela Sasse, Dimitrios Miras:
Sharp or smooth?: comparing the effects of quantization vs. frame rate for streamed video. CHI 2004: 535-542 - [c30]Richard Boardman, Martina Angela Sasse:
"Stuff goes into the computer and doesn't come out": a cross-tool study of personal information management. CHI 2004: 583-590 - [e3]Henning Schulzrinne, Nevenka Dimitrova, Martina Angela Sasse, Sue B. Moon, Rainer Lienhart:
Proceedings of the 12th ACM International Conference on Multimedia, New York, NY, USA, October 10-16, 2004. ACM 2004, ISBN 1-58113-893-8 [contents] - 2003
- [j7]Jens Riegelsberger, Martina Angela Sasse, John D. McCarthy:
The researcher's dilemma: evaluating trust in computer-mediated communication. Int. J. Hum. Comput. Stud. 58(6): 759-781 (2003) - [c29]Jens Riegelsberger, Martina Angela Sasse, John D. McCarthy:
Shiny happy people building trust?: photos on e-commerce websites and consumer trust. CHI 2003: 121-128 - [c28]Maia Garau, Mel Slater, Vinoba Vinayagamoorthy, Andrea Brogni, Anthony Steed, Martina Angela Sasse:
The impact of avatar realism and eye gaze control on perceived quality of communication in a shared immersive virtual environment. CHI 2003: 529-536 - [c27]Ivan Flechais, Martina Angela Sasse, Stephen Hailes:
Bringing security home: a process for developing secure and usable systems. NSPW 2003: 49-57 - 2002
- [j6]Louise Sheeran, Martina Angela Sasse, Jon Rimmer, Ian Wakeman
:
How Web browsers shape users' understanding of networks. Electron. Libr. 20(1): 35-42 (2002) - [c26]Jens Riegelsberger, Martina Angela Sasse:
Face it - photos don't make a web site trustworthy. CHI Extended Abstracts 2002: 742-743 - [c25]Jens Riegelsberger, Martina Angela Sasse, John D. McCarthy:
Eye-Catcher of Blind Spot? The Effect of Photographs of Faces on eCommerce Sites. I3E 2002: 383-398 - 2001
- [c24]Anne Adams, Martina Angela Sasse:
Privacy in Multimedia Communications: Protecting Users, Not Just Data. BCS HCI/IHM 2001: 49-64 - [c23]Dirk Weirich, Martina Angela Sasse:
Persuasive password security. CHI Extended Abstracts 2001: 139-140 - [c22]