A study of privacy settings errors in an online social network M Madejski, M Johnson, SM Bellovin 2012 IEEE International Conference on Pervasive Computing and Communications …, 2012 | 503* | 2012 |
Toward trustworthy AI development: mechanisms for supporting verifiable claims M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ... arXiv preprint arXiv:2004.07213, 2020 | 435 | 2020 |
Facebook and privacy: it's complicated M Johnson, S Egelman, SM Bellovin Proceedings of the Eighth Symposium on Usable Privacy and Security, 9, 2012 | 318 | 2012 |
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources C Thompson, M Johnson, S Egelman, D Wagner, J King Proceedings of the Ninth Symposium on Usable Privacy and Security, 2013 | 58* | 2013 |
Laissez-faire file sharing: Access control designed for individuals at the endpoints ML Johnson, SM Bellovin, RW Reeder, SE Schechter Proceedings of the 2009 workshop on New security paradigms workshop, 1-10, 2009 | 55 | 2009 |
Optimizing a policy authoring framework for security and privacy policies M Johnson, J Karat, CM Karat, K Grueneberg Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-9, 2010 | 51 | 2010 |
What can’t data be used for? N Malkin, J Bernd, M Johnson, S Egelman Privacy expectations about smart tvs in the us. In European Workshop on …, 2018 | 47 | 2018 |
Usable policy template authoring for iterative policy refinement M Johnson, J Karat, CM Karat, K Grueneberg IEEE International Symposium on Policies for Distributed Systems and …, 2010 | 46 | 2010 |
“What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the US N Malkin, J Bernd, M Johnson, S Egelman Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC), 2018 | 33 | 2018 |
Toward trustworthy AI development: mechanisms for supporting verifiable claims (2020) M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ... arXiv preprint arXiv:2004.07213, 2020 | 23 | 2020 |
A design for using physiological signals to affect team game play ZO Toups, R Graeber, A Kerne, L Tassinary, S Berry, K Overby, ... Foundations of Augmented Cognition, 134-139, 2006 | 18 | 2006 |
Toward Usable Access Control for End-users: A case study of Facebook privacy settings ML Johnson Columbia University, 2012 | 17 | 2012 |
Security user studies and standards: Creating best practices ML Johnson, ME Zurko Proceedings of ACM CHI 7, 2007 | 17 | 2007 |
Computer security research with human subjects: risks, benefits and informed consent ML Johnson, SM Bellovin, AD Keromytis International conference on financial cryptography and data security, 131-137, 2011 | 11 | 2011 |
Simple-vpn: Simple ipsec configuration S Srivatsan, M Johnson, SM Bellovin Department of Computer Science, Columbia University, Tech. Rep. CUCS-020-10, 2010 | 11 | 2010 |
Smart Home Bystanders: Further Complexifying a Complex Context J Bernd, A Frik, M Johnson, N Malkin | 8 | 2019 |
Teaching cybersecurity: Introducing the security mindset J Bernd, D Garcia, B Holley, M Johnson Proceedings of the 53rd ACM Technical Symposium on Computer Science …, 2022 | 7 | 2022 |
Taking data exposure into account: how does it affect the choice of sign-in accounts? S Ronen, O Riva, M Johnson, D Thompson Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013 | 6 | 2013 |
Source prefix filtering in ROFL H Zhao, SM Bellovin Tech. Rep. CUCS-33–09, 2009 | 6 | 2009 |
Cybersecurity through an identity management system E Androulaki, M Johnson, B Vo, S Bellovin Engaging Data Forum, MIT, 2009 | 5 | 2009 |