Rick Wash

Orcid: 0000-0003-4266-975X

According to our database1, Rick Wash authored at least 44 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
How an Online Health Support Community Responded to the COVID-19 Crisis.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Anyone else have this experience: Sharing the Emotional Labor of Tracking Data About Me.
Proc. ACM Hum. Comput. Interact., 2021

Prioritizing security over usability: Strategies for how people choose passwords.
J. Cybersecur., 2021

How Potential New Members Approach an Online Community.
Comput. Support. Cooperative Work., 2021

Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

2020
How Experts Detect Phishing Scam Emails.
Proc. ACM Hum. Comput. Interact., 2020

2019
"The Most Trustworthy Coin": How Ideological Tensions Drive Trust in Bitcoin.
Proc. ACM Hum. Comput. Interact., 2019

How "True Bitcoiners" Work on Reddit to Maintain Bitcoin.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Who Provides Phishing Training?: Facts, Stories, and People Like Me.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Usable Security.
IEEE Internet Comput., 2017

The Rich Get Richer? Limited Learning in Charitable Giving on donorschoose.org.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Can People Self-Report Security Accurately?: Agreement Between Self-Report and Behavioral Measures.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Highly Successful Projects Inhibit Coordination on Crowdfunding Sites.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Identifying patterns in informal sources of security information.
J. Cybersecur., 2015

Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Are You Listening?: Social Roles and Perceived Value of Statements in Online Learning Communities.
Proceedings of the Second ACM Conference on Learning @ Scale, 2015

Don't Wait!: How Timing Affects Coordination of Crowdfunding Donations.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

2014
Helping You Protect You.
IEEE Secur. Priv., 2014

Latent Users in an Online User-Generated Content Community.
Comput. Support. Cooperative Work., 2014

Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Critical Mass of What? Exploring Community Growth in WikiProjects.
Proceedings of the Eighth International Conference on Weblogs and Social Media, 2014

Coordinating donors on crowdfunding websites.
Proceedings of the Computer Supported Cooperative Work, 2014

Betrayed by updates: how negative experiences affect future security.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Crowdfunding: an emerging field of research.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
A virtual "Room" with a cue: Detecting personality through spatial customization in a city simulation game.
Comput. Hum. Behav., 2013

The Value of Completing Crowdfunding Projects.
Proceedings of the Seventh International Conference on Weblogs and Social Media, 2013

2012
Folk Security.
IEEE Secur. Priv., 2012

Stories as informal lessons about security.
Proceedings of the Symposium On Usable Privacy and Security, 2012

The power of the ask in social media.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, 2012

Bootstrapping wikis: developing critical mass in a fledgling community by seeding content.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, 2012

Design, influence, and social technologies: techniques, impacts, and ethics.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, 2012

2011
Student use of Facebook for organizing collaborative classroom activities.
Int. J. Comput. Support. Collab. Learn., 2011

Influencing mental models of security: a research agenda.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

The "S" in Social Network Games: Initiating, Maintaining, and Enhancing Relationships.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Folk models of home computer security.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Motivations to participate in online communities.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2008
Influences on tag choices in del.icio.us.
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, 2008

2007
Incentive design for home computer security.
Proceedings of the Extended Abstracts Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

Public bookmarks and private benefits: An analysis of incentives in social computing.
Proceedings of the Joining Research and Practice: Social Computing and Information Science, 2007

Security when people matter: structuring incentives for user behavior.
Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007

2006
Incentive-Centered Design for Information Security.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

2005
Design decisions in the RideNow project.
Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, 2005

2004
An economic answer to unsolicited communication.
Proceedings of the Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), 2004


  Loading...