Managing access to confidential documents: A case study of an email security tool E Al Qahtani, Y Javed, S Tabassum, L Sahoo, M Shehab Future Internet 15 (11), 356, 2023 | 2 | 2023 |
What Drives {SMiShing} Susceptibility? A {US}. Interview Study of How and Why Mobile Phone Users Judge Text Messages to be Real or Fake S Tabassum, C Faklaris, HR Lipford Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 393-411, 2024 | 1 | 2024 |
Preliminary results from a us demographic analysis of smish susceptibility C Faklaris, HR Lipford, S Tabassum arXiv preprint arXiv:2309.06322, 2023 | 1 | 2023 |
Digital Privacy for Migrants: Exploring Current Research Trends and Future Prospects S Tabassum, C Faklaris arXiv preprint arXiv:2406.02520, 2024 | | 2024 |
Replication: What Would Motivate Users to Use Gmail's Confidential Mode? E Al Qahtani, Y Javed, S Tabassum, M Shehab HICSS, 7645-7654, 2024 | | 2024 |
Understanding Privacy and Security Challenges of First-Generation Educational Migrants in the USA: A Proposal for Research S Tabassum, C Faklaris | | |