A study of privacy settings errors in an online social network M Madejski, M Johnson, SM Bellovin 2012 IEEE International Conference on Pervasive Computing and Communications …, 2012 | 496* | 2012 |
Toward trustworthy AI development: mechanisms for supporting verifiable claims M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ... arXiv preprint arXiv:2004.07213, 2020 | 380 | 2020 |
Facebook and privacy: it's complicated M Johnson, S Egelman, SM Bellovin Proceedings of the Eighth Symposium on Usable Privacy and Security, 9, 2012 | 312 | 2012 |
“What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the US N Malkin, J Bernd, M Johnson, S Egelman Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC), 2018 | 65 | 2018 |
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources C Thompson, M Johnson, S Egelman, D Wagner, J King Proceedings of the Ninth Symposium on Usable Privacy and Security, 2013 | 54* | 2013 |
Laissez-faire file sharing: Access control designed for individuals at the endpoints ML Johnson, SM Bellovin, RW Reeder, SE Schechter Proceedings of the 2009 workshop on New security paradigms workshop, 1-10, 2009 | 53 | 2009 |
Optimizing a policy authoring framework for security and privacy policies M Johnson, J Karat, CM Karat, K Grueneberg Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-9, 2010 | 47 | 2010 |
Usable policy template authoring for iterative policy refinement M Johnson, J Karat, CM Karat, K Grueneberg IEEE International Symposium on Policies for Distributed Systems and …, 2010 | 43 | 2010 |
The failure of online social network privacy settings. Department of Computer Science M Madejski, M Johnson, SM Bellovin Columbia University, Technical Report CUCS-010-11, 2011 | 23 | 2011 |
Toward trustworthy AI development: mechanisms for supporting verifiable claims (2020) M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ... arXiv preprint arXiv:2004.07213, 2020 | 20 | 2020 |
A design for using physiological signals to affect team game play ZO Toups, R Graeber, A Kerne, L Tassinary, S Berry, K Overby, ... Foundations of Augmented Cognition, 134-139, 2006 | 19 | 2006 |
Toward Usable Access Control for End-users: A case study of Facebook privacy settings ML Johnson Columbia University, 2012 | 17 | 2012 |
Security user studies and standards: Creating best practices ML Johnson, ME Zurko Proc. of ACM CHI’2007 Workshop on Security User Studies (San Jose, 2007 | 16 | 2007 |
Computer security research with human subjects: risks, benefits and informed consent ML Johnson, SM Bellovin, AD Keromytis Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR …, 2012 | 11 | 2012 |
Simple-vpn: Simple ipsec configuration S Srivatsan, ML Johnson, SM Bellovin | 10 | 2010 |
Smart Home Bystanders: Further Complexifying a Complex Context J Bernd, A Frik, M Johnson, N Malkin | 7 | 2019 |
Taking data exposure into account: how does it affect the choice of sign-in accounts? S Ronen, O Riva, M Johnson, D Thompson Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013 | 6 | 2013 |
Source prefix filtering in ROFL H Zhao, ML Johnson, CK Chau, SM Bellovin | 6 | 2009 |
Cybersecurity through an identity management system E Androulaki, BD Vo, SM Bellovin | 5 | 2009 |
Teaching cybersecurity: Introducing the security mindset J Bernd, D Garcia, B Holley, M Johnson Proceedings of the 53rd ACM Technical Symposium on Computer Science …, 2022 | 4 | 2022 |