Masooda N. Bashir

Orcid: 0000-0001-8299-3111

According to our database1, Masooda N. Bashir authored at least 66 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Evaluating User Behavior in Smartphone Security: A Psychometric Perspective.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Exploring the Influence of Self-Avatar Similarity on Human-Robot Trust.
Proceedings of the 32nd IEEE International Conference on Robot and Human Interactive Communication, 2023

Effects of Self-avatar Similarity on User Trusting Behavior in Virtual Reality Environment.
Proceedings of the HCI International 2023 Posters, 2023

The Influence of Situational Variables Toward Initial Trust Formation on Autonomous System.
Proceedings of the HCI in Mobility, Transport, and Automotive Systems, 2023

2022
A Privacy Glossary for Cloud Computing.
CoRR, 2022

Do Users' Values Influence Trust in Automation?
Proceedings of the Intelligent Human Computer Interaction, 2022

An Analysis of Cloud Certifications' Performance on Privacy Protections.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Attitudes Towards the Use of COVID-19 Apps and Its Associated Factors.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

An Analysis of Mobile Gaming Apps' Privacy Policies.
Proceedings of the IEEE Games, Entertainment, Media Conference, 2022

Toward Designing Trustworthy Autonomous Systems: Probing the Role of Humans' Ethical Perspectives.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Enabling User-centered Privacy Controls for Mobile Applications: COVID-19 Perspective.
ACM Trans. Internet Techn., 2021

Public Reaction on Social Media During COVID-19: A Comparison Between Twitter and Weibo.
Proceedings of the Intelligent Computing, 2021

Mapping Risk Assessment Strategy for COVID-19 Mobile Apps' Vulnerabilities.
Proceedings of the Intelligent Computing, 2021

Assessing Individual Differences in Coping Mechanisms during the COVID-19 Pandemic.
Proceedings of the ICMHI 2021: 5th International Conference on Medical and Health Informatics, 2021

Gaming Apps' and Social Media Partnership: A Privacy Perspective.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

COVID -19 Apps and Privacy Protections from Users' Perspective.
Proceedings of the Information: Equity, Diversity, Inclusion, Justice, and Relevance, 2021

2020
Are PETs (Privacy Enhancing Technologies) Giving Protection for Smartphones? - A Case Study.
CoRR, 2020

Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security.
CoRR, 2020

Advocating for Users' Privacy Protections: A Case study of COVID-19 apps.
Proceedings of the MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services: Expanding the Horizon of Mobile Interaction, 2020

Privacy Apps for Smartphones: An Assessment of Users' Preferences and Limitations.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

An Examination of Dispositional Trust in Human and Autonomous System Interactions.
Proceedings of the Human-Computer Interaction. Human Values and Quality of Life, 2020

Privacy considerations when predicting mental health using social media.
Proceedings of the Information for a Sustainable World: Addressing Society's Grand Challenges, 2020

Investigating the Differences in Privacy News Based on Grounded Theory.
Proceedings of the Advances in Physical, Social & Occupational Ergonomics, 2020

A Study of Social Media Behaviors and Mental Health Wellbeing from a Privacy Perspective.
Proceedings of the Advances in Artificial Intelligence, Software and Systems Engineering, 2020

An Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited.
Proceedings of the Advances in Human Factors in Cybersecurity, 2020

Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems?
Proceedings of the Advances in Human Factors in Cybersecurity, 2020

Ethics, Economics, and Ransomware: How Human Decisions Grow the Threat.
Proceedings of the Advances in Human Factors in Cybersecurity, 2020

Towards Inclusive Privacy Protections in the Cloud.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Human vs Bots: Detecting Human Attacks in a Honeypot Environment.
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019

Preserving Privacy in Cyber-physical-social Systems: An Anonymity and Access Control Approach.
Proceedings of the 1st Workshop on Cyber-Physical Social Systems co-located with the 9th International Conference on the Internet of Things (IoT 2019), 2019

'If You Agree with Me, Do I Trust You?': An Examination of Human-Agent Trust from a Psychological Perspective.
Proceedings of the Intelligent Systems and Applications, 2019

Putting a price on social movements: A case study of #metoo on instagram.
Proceedings of the Information... Anyone, Anywhere, Any Time, Any Way, 2019

2018
A Case Study-based Cybersecurity Ethics Curriculum.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018

Surfing safely: Examining older adults' online privacy protection behaviors.
Proceedings of the Building & Sustaining an Ethical Future with Emerging Technology, 2018

2017
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool.
Comput. Secur., 2017

Stance Classification of Twitter Debates: The Encryption Debate as A Use Case.
Proceedings of the 8th International Conference on Social Media & Society, 2017

Accounting for the Human User in Predictive Security Models.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Cloud security certifications: a comparison to improve cloud service provider security.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Android App Permission and Users' Adoption: A Case Study of Mental Health Application.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Personal Influences on Dynamic Trust Formation in Human-Agent Interaction.
Proceedings of the 5th International Conference on Human Agent Interaction, 2017

IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

Privacy and Security of Cardiovascular Implantable Electronic Devices: Applying a Contextual Integrity Analysis.
Proceedings of the Advances in Human Factors and Ergonomics in Healthcare and Medical Devices, 2017

Users' Attitudes Towards the "Going Dark" Debate.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017

Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security?
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Self-Efficacy in Cybersecurity Tasks and Its Relationship with Cybersecurity Competition and Work-Related Outcomes.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

The Cybersecurity Competition Experience: Perceptions from Cybersecurity Workers.
Proceedings of the 2nd Workshop on Security Information Workers, 2016

What Motivates People to Use Bitcoin?
Proceedings of the Social Informatics - 8th International Conference, 2016

Users' perspective on designing inclusive privacy-enhancing indicators.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

The onion router: Understanding a privacy enhancing technology community.
Proceedings of the Creating Knowledge, Enhancing Lives through Information & Technology, 2016

"What Is Your Evidence?" A Study of Controversial Topics on Social Media.
Proceedings of the Third Workshop on Argument Mining, 2016

2015
Cybersecurity Competitions: The Human Angle.
IEEE Secur. Priv., 2015

Trust in Automation: Integrating Empirical Evidence on Factors That Influence Trust.
Hum. Factors, 2015

On the Memorability of System-generated PINs: Can Chunking Help?
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Is privacy a human right? An empirical examination in a global context.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Digital Forensics Education: A Multidisciplinary Curriculum Model.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

Exploring the Effectiveness of Digital Forensics Tools on the Sony PlayStation Vita.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

Quantitative security metrics with human in the loop.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Examining the Gender Gap in Information Assurance: A Study of Psychological Factors.
Proceedings of the HCI International 2015 - Posters' Extended Abstracts, 2015

Library patron privacy in jeopardy an analysis of the privacy policies of digital content vendors.
Proceedings of the Information Science with Impact: Research in and for the Community, 2015

Direct-to-Consumer genetic testing: Contextual privacy predicament.
Proceedings of the Information Science with Impact: Research in and for the Community, 2015

Online privacy and informed consent: The dilemma of information asymmetry.
Proceedings of the Information Science with Impact: Research in and for the Community, 2015

2014
Developing a new digital forensics curriculum.
Digit. Investig., 2014

Who Uses Bitcoin? An exploration of the Bitcoin community.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Are Bitcoin Users Less Sociable? An Analysis of Users' Language and Social Connections on Twitter.
Proceedings of the HCI International 2014 - Posters' Extended Abstracts, 2014

2013
A theoretical model for trust in automated systems.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Does Profiling Make Us More Secure?
IEEE Secur. Priv., 2012


  Loading...