USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 25 results:
Filters: Author is Michelle L. Mazurek [Clear All Filters]
Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem. 32nd USENIX Security Symposium (USENIX Security 23). :2275--2291.
.
2023. How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities. 32nd USENIX Security Symposium (USENIX Security 23). :5647--5664.
.
2023. The Role of Professional Product Reviewers in Evaluating Security and Privacy. 32nd USENIX Security Symposium (USENIX Security 23). :2563--2580.
.
2023. Why Users (Don't) Use Password Managers at a Large Educational Institution. 31st USENIX Security Symposium (USENIX Security 22). :1849--1866.
.
2022. Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :597--616.
.
2021. Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and Smart-Speaker Platforms. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :139--158.
.
2021. Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption. 30th USENIX Security Symposium (USENIX Security 21). :447--464.
.
2021. "It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online. 30th USENIX Security Symposium (USENIX Security 21). :375--392.
.
2021. Pursuing Usable and Useful Data Downloads Under GDPR/CCPA Access Rights via Co-Design. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :217--242.
.
2021. Strategies and Perceived Risks of Sending Sensitive Documents. 30th USENIX Security Symposium (USENIX Security 21). :1217--1234.
.
2021. A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. 29th USENIX Security Symposium (USENIX Security 20). :89--108.
.
2020. An Observational Investigation of Reverse Engineers’ Processes. 29th USENIX Security Symposium (USENIX Security 20). :1875--1892.
.
2020. Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. 29th USENIX Security Symposium (USENIX Security 20). :109--126.
.
2020. What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data. 29th USENIX Security Symposium (USENIX Security 20). :145--162.
.
2020. The Effect of Entertainment Media on Mental Models of Computer Security. Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). :79--95.
.
2019. The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level. 27th USENIX Security Symposium (USENIX Security 18). :621--637.
.
2018. User Comfort with Android Background Resource Accesses in Different Contexts. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). :235--250.
.
2018. Diversify to Survive: Making Passwords Stronger with Adaptive Policies. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). :1--12.
.
2017. Exploring User Perceptions of Discrimination in Online Targeted Advertising. 26th USENIX Security Symposium (USENIX Security 17). :935--951.
.
2017. Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
.
2017. Security Developer Studies with GitHub Users: Exploring a Convenience Sample. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). :81--95.
.
2017. An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems. Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). :113--130.
.
2016. Measuring Real-World Accuracies and Biases in Modeling Password Guessability. 24th USENIX Security Symposium (USENIX Security 15). :463--481.
.
2015. Toward Strong, Usable Access Control for Shared Distributed Data. 12th USENIX Conference on File and Storage Technologies (FAST 14). :89--103.
.
2014. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation 21st USENIX Security Symposium (USENIX Security 12). :65--80.
.
2012.