Author: Serge Egelman

Publications

Publication period start: 2012
Number of co-authors: 26

Co-authors

Number of publications with favourite co-authors
Alessandro Acquisti
3
Stuart Schechter
3
Lorrie Faith Cranor
4

Productive Colleagues

Most productive colleagues in number of publications
A. J. Bernheim Brush
40
Lorrie Faith Cranor
44
Kori Inkpen
70

Publications

Egelman, Serge, Cranor, Lorrie Faith, Hong, Jason (2008): You\'ve been warned: an empirical study of the effectiveness of web browser phishing warni. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1065-1074. https://doi.acm.org/10.1145/1357054.1357219

Gideon, Julia, Cranor, Lorrie, Egelman, Serge, Acquisti, Alessandro (2006): Power strips, prophylactics, and privacy, oh my!. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 133-144. https://cups.cs.cmu.edu/soups/2006/slides/egelman.ppt Slides

Egelman, Serge, Brush, A. J. Bernheim, Inkpen, Kori (2008): Family accounts: a new paradigm for user accounts within the home environment. In: Proceedings of ACM CSCW08 Conference on Computer-Supported Cooperative Work , 2008, . pp. 669-678. https://doi.acm.org/10.1145/1460563.1460666

Egelman, Serge, Tsai, Janice, Cranor, Lorrie Faith, Acquisti, Alessandro (2009): Timing is everything?: the effects of timing and placement of online privacy indicators. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 319-328. https://doi.acm.org/10.1145/1518701.1518752

Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 1983-1992. https://doi.acm.org/10.1145/1518701.1519003

Egelman, Serge, Cranor, Lorrie Faith, Chowdhury, Abdur (2006): An analysis of P3P-enabled web sites among top-20 search results. In: Fox, Mark S., Spencer, Bruce (eds.) Proceedings of the 8th International Conference on Electronic Commerce - ICEC 2006 , 2006, Fredericton, New Brunswick, Canada. pp. 197-207. https://doi.acm.org/10.1145/1151454.1151492

Tsai, Janice, Egelman, Serge, Cranor, Lorrie, Acquisti, Alessandro (2009): The impact of privacy indicators on search engine browsing patterns. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 29. https://doi.acm.org/10.1145/1572532.1572568

Schechter, Stuart, Brush, A. J. Bernheim, Egelman, Serge (2009): It\'s no secret: measuring the security and reliability of authentication via \'secret\' q. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 40. https://doi.acm.org/10.1145/1572532.1572580

Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 41. https://doi.acm.org/10.1145/1572532.1572581

Egelman, Serge, Oates, Andrew, Krishnamurthi, Shriram (2011): Oops, I did it again: mitigating repeated access control errors on Facebook. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2295-2304. https://dx.doi.org/10.1145/1978942.1979280

Komanduri, Saranga, Shay, Richard, Kelley, Patrick Gage, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith, Egelman, Serge (2011): Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2595-2604. https://dx.doi.org/10.1145/1978942.1979321

Felt, Adrienne Porter, Ha, Elizabeth, Egelman, Serge, Haney, Ariel, Chin, Erika, Wagner, David (2012): Android permissions: user attention, comprehension, and behavior. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 3. https://dx.doi.org/10.1145/2335356.2335360

Johnson, Maritza, Egelman, Serge, Bellovin, Steven M. (2012): Facebook and privacy: it's complicated. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 9. https://dx.doi.org/10.1145/2335356.2335369

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,660 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,660 designers enjoy our newsletter—sure you don’t want to receive it?