User Experiments

  • Y. Niu, E. Shi, R. Chow, P. Golle, and M. Jakobsson, “One experience collecting sensitive mobile data.” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936790,
    author = {Niu, Yuan and Shi, Elaine and Chow, Richard and Golle, Philippe and Jakobsson, Markus},
    citeulike-article-id = {7936790},
    citeulike-linkout-0 = {http://cups.cs.cmu.edu/soups/2010/user\_papers/Niu\_sensitive\_mobile\_data\_USER2010.pdf},
    journal = {Usable Security Experiment Reports (USER) Workshop},
    keywords = {authentication, mobile, publications, user-experiments},
    posted-at = {2010-10-01 18:12:02},
    priority = {2},
    title = {One Experience Collecting Sensitive Mobile Data},
    url = {http://cups.cs.cmu.edu/soups/2010/user\_papers/Niu\_sensitive\_mobile\_data\_USER2010.pdf},
    year = {2010}
    }
  • V. Anandpara, A. Dingman, M. Jakobsson, D. Liu, and H. Roinestad, “Phishing IQ tests measure fear, not ability,” in Fc’07/usec’07: proceedings of the 11th international conference on financial cryptography and 1st international conference on usable security, Berlin, Heidelberg, 2007, pp. 362-366.
    [Bibtex]
    @inproceedings{measure-fear,
    address = {Berlin, Heidelberg},
    author = {Anandpara, Vivek and Dingman, Andrew and Jakobsson, Markus and Liu, Debin and Roinestad, Heather},
    booktitle = {FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security},
    citeulike-article-id = {7845859},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usec07-fear.pdf},
    keywords = {fraud, phishing, publications, user-experiments},
    location = {Scarborough, Trinidad and Tobago},
    pages = {362--366},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Phishing {IQ} tests measure fear, not ability},
    url = {http://markus-jakobsson.com/papers/jakobsson-usec07-fear.pdf},
    year = {2007}
    }
  • M. Jakobsson, A. Tsow, A. Shah, E. Blevis, and Y. Lim, “What instills trust? a qualitative study of phishing,” in Fc’07/usec’07: proceedings of the 11th international conference on financial cryptography and 1st international conference on usable security, Berlin, Heidelberg, 2007, pp. 356-361.
    [Bibtex]
    @inproceedings{instills-trust,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Tsow, Alex and Shah, Ankur and Blevis, Eli and Lim, Youn-Kyung},
    booktitle = {FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security},
    citeulike-article-id = {7845858},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usec07-trust.pdf},
    keywords = {fraud, phishing, publications, user-experiments},
    location = {Scarborough, Trinidad and Tobago},
    pages = {356--361},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {What instills trust? a qualitative study of phishing},
    url = {http://markus-jakobsson.com/papers/jakobsson-usec07-trust.pdf},
    year = {2007}
    }
  • T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, “Social phishing,” Commun. acm, vol. 50, iss. 10, pp. 94-100, 2007.
    [Bibtex]
    @article{social-phishing,
    address = {New York, NY, USA},
    author = {Jagatic, Tom N. and Johnson, Nathaniel A. and Jakobsson, Markus and Menczer, Filippo},
    citeulike-article-id = {7845851},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-commacm07.pdf},
    journal = {Commun. ACM},
    keywords = {facebook, fraud, most-downloaded, phishing, publications, user-experiments},
    number = {10},
    pages = {94--100},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {ACM},
    title = {Social phishing},
    url = {http://markus-jakobsson.com/papers/jakobsson-commacm07.pdf},
    volume = {50},
    year = {2007}
    }
  • P. Finn and M. Jakobsson, “Designing and conducting phishing experiments,” in In ieee technology and society magazine, special issue on usability and security, 2007.
    [Bibtex]
    @inproceedings{Finn07designingand,
    author = {Finn, Peter and Jakobsson, Markus},
    booktitle = {In IEEE Technology and Society Magazine, Special Issue on Usability and Security},
    citeulike-article-id = {7845850},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeets07.pdf},
    keywords = {fraud, most-downloaded, phishing, publications, user-experiments},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE},
    title = {Designing and Conducting Phishing Experiments},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeets07.pdf},
    year = {2007}
    }
  • M. Jakobsson, N. Johnson, and P. Finn, “Why and how to perform fraud experiments,” Ieee security and privacy, vol. 6, iss. 2, pp. 66-68, 2008.
    [Bibtex]
    @article{fraud-exp,
    address = {Piscataway, NJ, USA},
    author = {Jakobsson, Markus and Johnson, Nathaniel and Finn, Peter},
    citeulike-article-id = {7845848},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeesp08.pdf},
    journal = {IEEE Security and Privacy},
    keywords = {fraud, phishing, publications, user-experiments},
    number = {2},
    pages = {66--68},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE Educational Activities Department},
    title = {Why and How to Perform Fraud Experiments},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeesp08.pdf},
    volume = {6},
    year = {2008}
    }
  • M. Jakobsson and J. Ratkiewicz, “Designing ethical phishing experiments: a study of (ROT13) rOnl query features,” in Www ’06: proceedings of the 15th international conference on world wide web, New York, NY, USA, 2006, pp. 513-522.
    [Bibtex]
    @inproceedings{ethical-phishing-www06,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Ratkiewicz, Jacob},
    booktitle = {WWW '06: Proceedings of the 15th international conference on World Wide Web},
    citeulike-article-id = {7845763},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    keywords = {authentication, fraud, most-downloaded, phishing, publications, user-experiments},
    location = {Edinburgh, Scotland},
    pages = {513--522},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Designing ethical phishing experiments: a study of ({ROT13}) {rOnl} query features},
    url = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    year = {2006}
    }
  • M. Jakobsson, E. Stolterman, S. Wetzel, and L. Yang, “Love and authentication,” in Chi ’08: proceeding of the twenty-sixth annual sigchi conference on human factors in computing systems, New York, NY, USA, 2008, pp. 197-200.
    [Bibtex]
    @inproceedings{love-auth-chi08,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Stolterman, Erik and Wetzel, Susanne and Yang, Liu},
    booktitle = {CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems},
    citeulike-article-id = {7845759},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-chi08.pdf},
    keywords = {authentication, most-downloaded, publications, user-experiments},
    location = {Florence, Italy},
    pages = {197--200},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Love and authentication},
    url = {http://markus-jakobsson.com/papers/jakobsson-chi08.pdf},
    year = {2008}
    }
  • M. Jakobsson, E. Shi, and R. Chow, “Implicit authentication for mobile devices,” in The 4th usenix workshop on hot topics in security (hotsec’09), Montreal, Canada, 2009.
    [Bibtex]
    @inproceedings{imp-auth-89,
    address = {Montreal, Canada},
    author = {Jakobsson, Markus and Shi, Elaine and Chow, Richard},
    booktitle = {The 4th USENIX Workshop on Hot Topics in Security (HotSec'09)},
    citeulike-article-id = {7845758},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-hotsec09.pdf},
    keywords = {authentication, mobile, publications, user-experiments},
    month = aug,
    organization = {USENIX},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {USENIX},
    title = {Implicit authentication for mobile devices},
    url = {http://markus-jakobsson.com/papers/jakobsson-hotsec09.pdf},
    year = {2009}
    }
  • M. Jakobsson and A. Tsow, “Identify theft,” in Computer and information security handbook, J. R. Vacca, Ed., Burlington, MA: Morgan Kaufmann, 2008, p. 519.
    [Bibtex]
    @incollection{cis-handbook,
    address = {Burlington, MA},
    author = {Jakobsson, Markus and Tsow, Alex},
    booktitle = {Computer And Information Security Handbook},
    chapter = {31},
    citeulike-article-id = {7845754},
    editor = {Vacca, John R.},
    keywords = {authentication, fraud, phishing, publications, user-experiments},
    pages = {519},
    posted-at = {2010-09-17 03:05:09},
    priority = {0},
    publisher = {Morgan Kaufmann},
    title = {Identify Theft},
    year = {2008}
    }
  • M. Jakobsson and S. Myers, Phishing and countermeasures: understanding the increasing problem of electronic identity theft, Wesley, 2006.
    [Bibtex]
    @book{phishing-book,
    author = {Jakobsson, Markus and Myers, Steven},
    citeulike-article-id = {7845751},
    keywords = {authentication, fraud, phishing, publications, user-experiments},
    posted-at = {2010-09-17 03:01:30},
    priority = {0},
    publisher = {Wesley},
    title = {Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft},
    year = {2006}
    }

Comments are closed.