Stebėti
Ingolf Becker
Ingolf Becker
Patvirtintas el. paštas cs.ucl.ac.uk - Pagrindinis puslapis
Pavadinimas
Cituota
Cituota
Metai
Productive security: A scalable methodology for analysing employee security behaviours
A Beautement, I Becker, S Parkin, K Krol, A Sasse
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 253-270, 2016
782016
Finding Security Champions in Blends of Organisational Culture
I Becker, S Parkin, MA Sasse
EuroUSEC '17, 2017
522017
Dataset: Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption
A Demjaha, J Spring, IF Becker, S Parkin, MA Sasse
UCL Jill Dando Institute of Security and Crime Science, 2018
38*2018
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption
A Demjaha, J Spring, IF Becker, S Parkin, MA Sasse
Workshop on Usable Security (USEC 2018), 2018
382018
From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design
MAS Steve Dodier-Lazaro, Ruba Abu-Salma, Ingolf Becker
CHI 2017 Workshop on Values in Computing, 7, 2017
362017
Interventions for long‐term software security: Creating a lightweight program of assurance techniques for developers
C Weir, I Becker, J Noble, L Blair, MA Sasse, A Rashid
Software: Practice and Experience 50 (3), 275-298, 2020
332020
A passion for security: Intervening to help software developers
C Weir, I Becker, L Blair
2021 IEEE/ACM 43rd International Conference on Software Engineering …, 2021
312021
Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection
S Zheng, I Becker
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 253-271, 2022
302022
A socio-technical and co-evolutionary framework for reducing human-related risks in cyber security and cybercrime ecosystems
T Islam, I Becker, R Posner, P Ekblom, M McGuire, H Borrion, S Li
International Conference on Dependability in Sensor, Cloud, and Big Data …, 2019
282019
International comparison of bank fraud reimbursement: customer perceptions and contractual terms
I Becker, A Hutchings, R Abu-Salma, R Anderson, N Bohm, SJ Murdoch, ...
Journal of Cybersecurity 3 (2), 109-125, 2017
232017
Interventions for software security: creating a lightweight program of assurance techniques for developers
C Weir, I Becker, J Noble, L Blair, A Sasse, A Rashid
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
212019
Applying cognitive control modes to identify security fatigue hotspots
S Parkin, K Krol, I Becker, MA Sasse
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
212016
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength
I Becker, S Parkin, MA Sasse
27th USENIX Security Symposium (USENIX Security 18), 2018
202018
Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations
I Becker, S Parkin, MA Sasse
Learning from Authoritative Security Experiment Results (LASER), 2016
162016
“It may be a pain in the backside but...” Insights into the resilience of business after GDPR
G Buckley, T Caulfield, I Becker
Proceedings of the 2022 New Security Paradigms Workshop, 21-34, 2022
14*2022
Light-touch interventions to improve software development security
C Weir, L Blair, I Becker, A Sasse, J Noble
2018 IEEE Cybersecurity Development (SecDev), 85-93, 2018
142018
Incorporating software security: using developer workshops to engage product managers
C Weir, I Becker, L Blair
Empirical Software Engineering 28 (2), 21, 2023
132023
Checking, nudging or scoring? Evaluating e-mail user security tools
SY Zheng, I Becker
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 57-76, 2023
132023
Are payment card contracts unfair?
SJ Murdoch, I Becker, R Abu-Salma, R Anderson, N Bohm, A Hutchings, ...
Financial Crypto, 2016
10*2016
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure {IoT}
N Sombatruang, T Caulfield, I Becker, A Fujita, T Kasama, K Nakao, ...
32nd USENIX Security Symposium (USENIX Security 23), 1541-1558, 2023
72023
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20