팔로우
Maritza Johnson
제목
인용
인용
연도
A study of privacy settings errors in an online social network
M Madejski, M Johnson, SM Bellovin
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
503*2012
Toward trustworthy AI development: mechanisms for supporting verifiable claims
M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ...
arXiv preprint arXiv:2004.07213, 2020
4352020
Facebook and privacy: it's complicated
M Johnson, S Egelman, SM Bellovin
Proceedings of the Eighth Symposium on Usable Privacy and Security, 9, 2012
3182012
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources
C Thompson, M Johnson, S Egelman, D Wagner, J King
Proceedings of the Ninth Symposium on Usable Privacy and Security, 2013
58*2013
Laissez-faire file sharing: Access control designed for individuals at the endpoints
ML Johnson, SM Bellovin, RW Reeder, SE Schechter
Proceedings of the 2009 workshop on New security paradigms workshop, 1-10, 2009
552009
Optimizing a policy authoring framework for security and privacy policies
M Johnson, J Karat, CM Karat, K Grueneberg
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-9, 2010
512010
What can’t data be used for?
N Malkin, J Bernd, M Johnson, S Egelman
Privacy expectations about smart tvs in the us. In European Workshop on …, 2018
472018
Usable policy template authoring for iterative policy refinement
M Johnson, J Karat, CM Karat, K Grueneberg
IEEE International Symposium on Policies for Distributed Systems and …, 2010
462010
“What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the US
N Malkin, J Bernd, M Johnson, S Egelman
Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC), 2018
332018
Toward trustworthy AI development: mechanisms for supporting verifiable claims (2020)
M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ...
arXiv preprint arXiv:2004.07213, 2020
232020
A design for using physiological signals to affect team game play
ZO Toups, R Graeber, A Kerne, L Tassinary, S Berry, K Overby, ...
Foundations of Augmented Cognition, 134-139, 2006
182006
Toward Usable Access Control for End-users: A case study of Facebook privacy settings
ML Johnson
Columbia University, 2012
172012
Security user studies and standards: Creating best practices
ML Johnson, ME Zurko
Proceedings of ACM CHI 7, 2007
172007
Computer security research with human subjects: risks, benefits and informed consent
ML Johnson, SM Bellovin, AD Keromytis
International conference on financial cryptography and data security, 131-137, 2011
112011
Simple-vpn: Simple ipsec configuration
S Srivatsan, M Johnson, SM Bellovin
Department of Computer Science, Columbia University, Tech. Rep. CUCS-020-10, 2010
112010
Smart Home Bystanders: Further Complexifying a Complex Context
J Bernd, A Frik, M Johnson, N Malkin
82019
Teaching cybersecurity: Introducing the security mindset
J Bernd, D Garcia, B Holley, M Johnson
Proceedings of the 53rd ACM Technical Symposium on Computer Science …, 2022
72022
Taking data exposure into account: how does it affect the choice of sign-in accounts?
S Ronen, O Riva, M Johnson, D Thompson
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
62013
Source prefix filtering in ROFL
H Zhao, SM Bellovin
Tech. Rep. CUCS-33–09, 2009
62009
Cybersecurity through an identity management system
E Androulaki, M Johnson, B Vo, S Bellovin
Engaging Data Forum, MIT, 2009
52009
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20