Author: Stuart Schechter

Publications

Publication period start: 2012
Number of co-authors: 7

Co-authors

Number of publications with favourite co-authors
A. J. Bernheim Brush
3
Serge Egelman
3
Robert W. Reeder
3

Productive Colleagues

Most productive colleagues in number of publications
Serge Egelman
13
Robert W. Reeder
14
A. J. Bernheim Brush
40

Publications

Karlson, Amy K., Brush, A. J. Bernheim, Schechter, Stuart (2009): Can i borrow your phone?: understanding concerns when sharing mobile phones. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 1647-1650. https://doi.acm.org/10.1145/1518701.1518953

Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 1983-1992. https://doi.acm.org/10.1145/1518701.1519003

Schechter, Stuart, Reeder, Robert W. (2009): 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentic. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 9. https://doi.acm.org/10.1145/1572532.1572544

Schechter, Stuart, Brush, A. J. Bernheim, Egelman, Serge (2009): It\'s no secret: measuring the security and reliability of authentication via \'secret\' q. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 40. https://doi.acm.org/10.1145/1572532.1572580

Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 41. https://doi.acm.org/10.1145/1572532.1572581

Hayashi, Eiji, Riva, Oriana, Strauss, Karin, Brush, A. J. Bernheim, Schechter, Stuart (2012): Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's ap. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 2. https://dx.doi.org/10.1145/2335356.2335359

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,311 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,311 designers enjoy our newsletter—sure you don’t want to receive it?