Serge Egelman
Serge Egelman
University of California, Berkeley / International Computer Science Institute (ICSI) / AppCensus
Verified email at - Homepage
Cited by
Cited by
Android Permissions: User Attention, Comprehension, and Behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
The effect of online privacy information on purchasing behavior: An experimental study
JY Tsai, S Egelman, L Cranor, A Acquisti
Information Systems Research 22 (2), 254-268, 2011
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, J Hong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
Crying Wolf: An Empirical Study of SSL Warning Effectiveness.
J Sunshine, S Egelman, H Almuhimedi, N Atri, LF Cranor
USENIX Security Symposium, 399-416, 2009
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
Phinding phish: Evaluating anti-phishing tools
Y Zhang, S Egelman, L Cranor, J Hong
Network and Distributed Systems Symposium (NDSS), 2006
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
AP Felt, S Egelman, D Wagner
Proceedings of the second ACM workshop on Security and privacy in …, 2012
Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS)
S Egelman, E Peer
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
Facebook and Privacy: It’s Complicated
M Johnson, S Egelman, SM Bellovin
Symposium on Usable Privacy and Security (SOUPS), 2012
Does my password go up to eleven?: the impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
Android Permissions Remystified: A Field Study on Contextual Integrity.
P Wijesekera, A Baokar, A Hosseini, S Egelman, D Wagner, K Beznosov
USENIX Security Symposium, 499-514, 2015
It's no secret. measuring the security and reliability of authentication via “secret” questions
S Schechter, AJB Brush, S Egelman
2009 30th IEEE Symposium on Security and Privacy, 375-390, 2009
“Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale
I Reyes, P Wijesekera, J Reardon, AEB On, A Razaghpanah, ...
Proceedings on Privacy Enhancing Technologies 2018 (3), 63-83, 2018
Choice architecture and smartphone privacy: There’s a price for that
S Egelman, AP Felt, D Wagner
The Economics of Information Security and Privacy, 211-236, 2013
Are You Ready to Lock?
S Egelman, S Jain, RS Portnoff, K Liao, S Consolvo, D Wagner
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System
J Reardon, Į Feal, P Wijesekera, AEB On, N Vallina-Rodriguez, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 603-620, 2019
Timing is everything?: the effects of timing and placement of online privacy indicators
S Egelman, J Tsai, LF Cranor, A Acquisti
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
Privacy Attitudes of Smart Speaker Users
N Malkin, J Deatrick, A Tong, P Wijesekera, S Egelman, D Wagner
Proceedings on Privacy Enhancing Technologies 2019 (4), 250-271, 2019
How to ask for permission
AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner
USENIX Workshop on Hot Topics in Security, 2012
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences
P Wijesekera, A Baokar, L Tsai, J Reardon, S Egelman, D Wagner, ...
2017 IEEE Symposium on Security and Privacy (SP), 1077-1093, 2017
The system can't perform the operation now. Try again later.
Articles 1–20