Mahdi N. Al-Ameen

Orcid: 0000-0002-5764-2253

According to our database1, Mahdi N. Al-Ameen authored at least 43 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Deep Dive into User's Preferences and Behavior around Mobile Phone Sharing.
Proc. ACM Hum. Comput. Interact., April, 2023

Towards Improving the Efficacy of Windows Security Notifier for Apps from Unknown Publishers: The Role of Rhetoric.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

"I Have Learned that Things are Different here": Understanding the Transitional Challenges with Technology Use After Relocating to the USA.
Proceedings of the Cross-Cultural Design, 2023

Understanding the Challenges in Academia to Prepare Nursing Students for Digital Technology Use at Workplace.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

"\"It doesn't just feel like something a lawyer slapped together.\"- Mental-Model-Based Privacy Policy for Third-Party Applications on Facebook".
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

"After she fell asleep, it went to my next podcast, which was about a serial killer": Unveiling Needs and Expectations Regarding Parental Control within Digital Assistant.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

Can Password Meter be More Effective Towards User Attention, Engagement, and Attachment?: A Study of Metaphor-based Designs.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

2022
Imagined Online Communities: Communionship, Sovereignty, and Inclusiveness in Facebook Groups.
Proc. ACM Hum. Comput. Interact., 2022

Understanding the Behavior, Challenges, and Privacy Risks in Digital Technology Use by Nursing Professionals.
Proc. ACM Hum. Comput. Interact., 2022

On improving the memorability of system-assigned recognition-based passwords.
Behav. Inf. Technol., 2022

Intermediate Help with Using Digital Devices and Online Accounts: Understanding the Needs, Expectations, and Vulnerabilities of Young Adults.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

The Role of Intermediaries, Terrorist Assemblage, and Re-skilling in the Adoption of Cashless Transaction Systems in Bangladesh.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

2021
"We, three brothers have always known everything of each other": A Cross-cultural Study of Sharing Digital Devices and Online Accounts.
Proc. Priv. Enhancing Technol., 2021

A look into user privacy andthird-party applications in Facebook.
Inf. Comput. Secur., 2021

A look into user's privacy perceptions and data practices of IoT devices.
Inf. Comput. Secur., 2021

A first look into users' perceptions of facial recognition in the physical world.
Comput. Secur., 2021

Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

Purdah, Amanah, and Gheebat: Understanding Privacy in Bangladeshi "pious" Muslim Communities.
Proceedings of the COMPASS '21: ACM SIGCAS Conference on Computing and Sustainable Societies, Virtual Event, Australia, 28 June 2021, 2021

2020
Privacy Vulnerabilities in Public Digital Service Centers in Dhaka, Bangladesh.
Proceedings of the 2020 International Conference on Information and Communication Technologies and Development, 2020

"Most Companies Share Whatever They Can to Make Money!": Comparing User's Perceptions with the Data Practices of IoT Devices.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Understanding the Sensibility of Social Media Use and Privacy with Bangladeshi Facebook Group Users.
Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies, 2020

We Don't Give a Second Thought Before Providing Our Information: Understanding Users' Perceptions of Information Collection by Apps in Urban Bangladesh.
Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies, 2020

A First Look into Users' Perceptions of Digital Medicine Technology.
Proceedings of the Companion Publication of the 2020 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2020

2019
Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2017
Exploring the Potential of GeoPass: A Geographic Location-Password Scheme.
Interact. Comput., 2017

Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers.
Proceedings of the 26th USENIX Security Symposium, 2017

Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
iPersea: Towards improving the Sybil-resilience of social DHT.
J. Netw. Comput. Appl., 2016

Leveraging autobiographical memory for two-factor online authentication.
Inf. Comput. Secur., 2016

Sensemaking and Storytelling: Network Security Strategies for Collaborative Groups.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016

2015
The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Leveraging Real-Life Facts to Make Random Passwords More Memorable.
Proceedings of the Computer Security - ESORICS 2015, 2015

Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
ReDS: A Framework for Reputation-Enhanced DHTs.
IEEE Trans. Parallel Distributed Syst., 2014

iPersea : The Improved Persea with Sybil Detection Mechanism.
CoRR, 2014

A Comprehensive Study of the GeoPass User Authentication Scheme.
CoRR, 2014

Q-A: Towards the Solution of Usability-Security Tension in User Authentication.
CoRR, 2014

Design and evaluation of persea, a sybil-resistant DHT.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
An Intelligent Fire Alert System using Wireless Mobile Communication.
CoRR, 2013

Persea: a sybil-resistant social DHT.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
SDA-2H: Understanding the Value of Background Cover Against Statistical Disclosure.
J. Networks, 2012


  Loading...