Kami Vaniea

Orcid: 0000-0001-8042-3342

Affiliations:
  • University of Waterloo, Ontario, Canada
  • University of Edinburgh, UK (former)


According to our database1, Kami Vaniea authored at least 52 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Twitter has a Binary Privacy Setting, are Users Aware of How It Works?
Proc. ACM Hum. Comput. Interact., April, 2023

Embedding Privacy Into Design Through Software Developers: Challenges and Solutions.
IEEE Secur. Priv., 2023

To Patch, or not To Patch? That is the Question: A Case Study of System Administrators' Online Collaborative Behaviour.
CoRR, 2023

Using Clustering Algorithms to Automatically Identify Phishing Campaigns.
IEEE Access, 2023

DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Multi-User Smart Speakers - A Narrative Review of Concerns and Problematic Interactions.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Understanding Privacy-Related Advice on Stack Overflow.
Proc. Priv. Enhancing Technol., 2022

Prototyping Usable Privacy and Security Systems: Insights from Experts.
Int. J. Hum. Comput. Interact., 2022

Embedding Privacy Into Design Through Software Developers: Challenges & Solutions.
CoRR, 2022

Can I Borrow Your ATM? Using Virtual Reality for (Simulated) In Situ Authentication Research.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2022

Virtual Reality Observations: Using Virtual Reality to Augment Lab-Based Shoulder Surfing Research.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2022

From an Authentication Question to a Public Social Event: Characterizing Birthday Sharing on Twitter.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Recruiting Participants With Programming Skills: A Comparison of Four Crowdsourcing Platforms and a CS Student Mailing List.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Understanding Privacy Switching Behaviour on Twitter.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Context-Based Clustering to Mitigate Phishing Attacks.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

Stay Home! Conducting Remote Usability Evaluations of Novel Real-World Authentication Systems Using Virtual Reality.
Proceedings of the AVI 2022: International Conference on Advanced Visual Interfaces, Frascati, Rome, Italy, June 6, 2022

2021
Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing.
ACM Trans. Comput. Hum. Interact., 2021

Owning and Sharing: Privacy Perceptions of Smart Speaker Users.
Proc. ACM Hum. Comput. Interact., 2021

A Case Study of Phishing Incident Response in an Educational Organization.
Proc. ACM Hum. Comput. Interact., 2021

Deciding on Personalized Ads: Nudging Developers About User Privacy.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Observing Virtual Avatars: The Impact of Avatars' Fidelity on Identifying Interactions.
Proceedings of the Mindtrek '21: Academic Mindtrek 2021, 2021

Security Notifications in Static Analysis Tools: Developers' Attitudes, Comprehension, and Ability to Act on Them.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

"Developers Are Responsible": What Ad Networks Tell Developers About Privacy.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

RepliCueAuth: Validating the Use of a Lab-Based Virtual Reality Setup for Evaluating Authentication Systems.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

I Don't Need an Expert! Making URL Phishing Features Human Comprehensible.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Analysing Privacy Leakage of Life Events on Twitter.
Proceedings of the WebSci '20: 12th ACM Conference on Web Science, 2020

Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

"Anyone Else Seeing this Error?": Community, System Administrators, and Patch Information.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Understanding Privacy-Related Questions on Stack Overflow.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

RubikAuth: Fast and Secure Authentication in Virtual Reality.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

What is this URL's Destination? Empirical Evaluation of Users' URL Reading.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
"I Don't Know Too Much About It": On the Security Mindsets of Computer Science Students.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

A Survey on Developer-Centred Security.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

A Review of Human- and Computer-Facing URL Phishing Features.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

2018
Automatic Phishing Detection vesus User Training, Is there a Middle Ground Using XAI?
Proceedings of the SICSA Workshop on Reasoning, 2018

2017
Capturing the Connections: Unboxing Internet of Things Devices.
CoRR, 2017

Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Was my message read?: Privacy and Signaling on Facebook Messenger.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Debunking Security-Usability Tradeoff Myths.
IEEE Secur. Priv., 2016

Tales of Software Updates: The process of updating software.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Factors Related to Privacy Concerns and Protection Behaviors Regarding Behavioral Advertising.
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 2015

2014
Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Betrayed by updates: how negative experiences affect future security.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2012
Out of sight, out of mind: Effects of displaying access-control information near the item it controls.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

2011
More than skin deep: measuring effects of the underlying model on access-control system usability.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Access control for home data sharing: evaluating social acceptability.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Real life challenges in access-control management.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Evaluating assistance of natural language policy authoring.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

A user study of policy creation in a flexible access-control system.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
User-Controllable Security and Privacy for Pervasive Computing.
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007

Lessons learned from the deployment of a smartphone-based access-control system.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007


  Loading...