Подписаться
Ayako A. Hasegawa
Ayako A. Hasegawa
Подтвержден адрес электронной почты в домене nict.go.jp - Главная страница
Название
Процитировано
Процитировано
Год
DomainScouter: Understanding the Risks of Deceptive IDNs
D Chiba, AA Hasegawa, T Koide, Y Sawabe, S Goto, M Akiyama
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
302019
Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails
AA Hasegawa, N Yamashita, M Akiyama, T Mori
The Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 319-338, 2021
242021
Comparative analysis of three language spheres: Are linguistic and cultural differences reflected in password selection habits?
K Mori, T Watanabe, Y Zhou, AA Hasegawa, M Akiyama, T Mori
IEICE TRANSACTIONS on Information and Systems 103 (7), 1541-1555, 2020
242020
Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods
T Matsuura, AA Hasegawa, M Akiyama, T Mori
The 2021 European Symposium on Usable Security (EuroUSEC2021), 2021
162021
How WEIRD is Usable Privacy and Security Research?
AA Hasegawa, D Inoue, M Akiyama
The 33rd USENIX Security Symposium (SEC'24), 2024
14*2024
Understanding Non-Experts’ Security-and Privacy-Related Questions on a Q&A Site
AA Hasegawa, N Yamashita, T Mori, D Inoue, M Akiyama
The Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 39-56, 2022
142022
I know what you did last login: inconsistent messages tell existence of a target's account to insiders
AA Hasegawa, T Watanabe, E Shioji, M Akiyama
Proceedings of the 35th annual computer security applications conference …, 2019
112019
Random matrices by MA models and compound free poisson laws
A Hasegawa, N Sakuma, H Yoshida
Probab. Math. Statist 33 (2), 243-254, 2013
92013
Domainscouter: Analyzing the risks of deceptive internationalized domain names
D Chiba, AA Hasegawa, T Koide, Y Sawabe, S Goto, M Akiyama
IEICE TRANSACTIONS on Information and Systems 103 (7), 1493-1511, 2020
52020
Fluctuations of Marchenko–Pastur limit of random matrices with dependent entries
A Hasegawa, N Sakuma, H Yoshida
Statistics & Probability Letters 127, 85-96, 2017
42017
Analyzing the Use of Public and In-house Secure Development Guidelines in US and Japanese Industries
F Kanei, AA Hasegawa, E Shioji, M Akiyama
The 2023 CHI Conference on Human Factors in Computing Systems, 1-17, 2023
32023
A cross-role and bi-national analysis on security efforts and constraints of software development projects
F Kanei, AA Hasegawa, E Shioji, M Akiyama
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
32021
日本国内における児童向けセキュリティ教材の実態調査
坪根恵, 長谷川彩子, 秋山満昭, 森達哉
研究報告セキュリティ心理学とトラスト (SPT) 2021 (43), 1-8, 2021
32021
Analysis of Non-Experts' Security-and Privacy-Related Questions on a Q&A Site
AA Hasegawa, M Akiyama, N Yamashita, D Inoue, T Mori
IEICE TRANSACTIONS on Information and Systems 106 (9), 1380-1396, 2023
22023
Experiences, behavioral tendencies, and concerns of non-native English speakers in identifying phishing emails
AA Hasegawa, N Yamashita, M Akiyama, T Mori
Journal of information processing 30, 841-858, 2022
22022
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services
AA Hasegawa, T Watanabe, E Shioji, M Akiyama, T Mori
Journal of information processing 28, 1030-1046, 2020
22020
Japanese Users’(Mis) understandings of Technical Terms Used in Privacy Policies and the Privacy Protection Law
S Kanamori, M Ikeda, K Kameishi, AA Hasegawa
International Conference on Human-Computer Interaction, 245-264, 2024
12024
プライバシーポリシーにおける収集データと目的の対応関係の実態調査
原亨, 長谷川彩子, 秋山満昭
研究報告セキュリティ心理学とトラスト (SPT) 2024 (18), 1-8, 2024
12024
Negative effects of social triggers on user security and privacy behaviors
L Moore, T Mori, AA Hasegawa
Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 605-622, 2024
12024
プライバシーポリシーに使用される技術用語および個人情報保護法に対するユーザの理解度の調査
金森祥子, 池田美穂, 亀石久美子, 長谷川彩子
コンピュータセキュリティシンポジウム 2023 論文集, 1012-1019, 2023
12023
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20