Robert W. Reeder

Affiliations:
  • Google
  • Microsoft


According to our database1, Robert W. Reeder authored at least 34 papers between 2001 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
An Experience Sampling Study of User Reactions to Browser Warnings in the Field.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users.
IEEE Secur. Priv., 2017

2016
Rethinking Connection Security Indicators.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Exploring the Value of Simulations in Plant Health in the Developing World.
Proceedings of the Serious Games - Second Joint International Conference, 2016

"She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
"...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Improving SSL Warnings: Comprehension and Adherence.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

"My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Experimenting at scale with google chrome's SSL warning.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Your attention please: designing security-decision UIs to make genuine risks harder to ignore.
Proceedings of the Symposium On Usable Privacy and Security, 2013

2011
When the Password Doesn't Work: Secondary Authentication for Websites.
IEEE Secur. Priv., 2011

Usable access control for all.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

More than skin deep: measuring effects of the underlying model on access-control system usability.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Visual vs. compact: a comparison of privacy policy interfaces.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Policy framework for security and privacy management.
IBM J. Res. Dev., 2009

1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

A comparative study of online privacy policies and formats.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

A "nutrition label" for privacy.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Usability meets access control: challenges and research opportunities.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Laissez-faire file sharing: access control designed for individuals at the endpoints.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

It's not what you know, but who you know: a social approach to last-resort authentication.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Real life challenges in access-control management.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
A user study of the expandable grid applied to P3P privacy policy visualization.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Expandable grids for visualizing and authoring computer security policies.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

A user study of policy creation in a flexible access-control system.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Usability Challenges in Security and Privacy Policy-Authoring Interfaces.
Proceedings of the Human-Computer Interaction, 2007

2006
User Interface Defect Detection by Hesitation Analysis.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
Improving user-interface dependability through mitigation of human error.
Int. J. Hum. Comput. Stud., 2005

Soups 2005.
IEEE Secur. Priv., 2005

User Interface Dependability through Goal-Error Prevention.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2002
A user-tracing architecture for modeling interaction with the world wide web.
Proceedings of the Working Conference on Advanced Visual Interfaces, 2002

2001
WebEyeMapper and WebLogger: tools for analyzing eye tracking data collected in web-use studies.
Proceedings of the CHI 2001 Extended Abstracts on Human Factors in Computing Systems, 2001

Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability.
Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31, 2001


  Loading...