Sameer Patil

Orcid: 0000-0002-8214-0765

According to our database1, Sameer Patil authored at least 56 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

2022
A Multi-Region Investigation of the Perceptions and Use of Smart Home Devices.
Proc. Priv. Enhancing Technol., 2022

Non-literal Communication in Chinese Internet Spaces: A Case Study of Fishing.
Proc. ACM Hum. Comput. Interact., 2022

Beyond the Pandemic and Privacy Concerns: Perceived Benefit and Expected Use of Pandemic-Tracking Apps in India.
Proc. ACM Hum. Comput. Interact., 2022

Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic.
Proc. ACM Hum. Comput. Interact., 2022

True or False: Studying the Work Practices of Professional Fact-Checkers.
Proc. ACM Hum. Comput. Interact., 2022

Do Regional Variations Affect the CAPTCHA User Experience? A Comparison of CAPTCHAs in China and the United States.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Still Creepy After All These Years: The Normalization of Affective Discomfort in App Use.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Fakey: A Game Intervention to Improve News Literacy on Social Media.
Proc. ACM Hum. Comput. Interact., 2021

Won't You Think of Others?: Interdependent Privacy in Smartphone App Permissions.
Proc. ACM Hum. Comput. Interact., 2021

Does This Photo Make Me Look Good?: How Social Media Feedback on Photos Impacts Posters, Outsiders, and Friends.
Proc. ACM Hum. Comput. Interact., 2021

Promoting Privacy Considerations in Real-World Projects in Capstone Courses with Ideation Cards.
ACM Trans. Comput. Educ., 2021

Exploring Privacy Aspects of Smartphone Notifications.
Proceedings of the MobileHCI '21: 23rd International Conference on Mobile Human-Computer Interaction, Toulouse & Virtual Event, France, 27 September 2021, 2021

Us and Them (and It): Social Orientation, Privacy Concerns, and Expected Use of Pandemic-Tracking Apps in the United States.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Empowering Resignation: There's an App for That.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

A Visual Exploration of Cybersecurity Concepts.
Proceedings of the 13th ACM SIGCHI Conference on Creativity and Cognition, 2021

2020
Predicting smartphone location-sharing decisions through self-reflection on past privacy behavior.
J. Cybersecur., 2020

Exposure to Social Engagement Metrics Increases Vulnerability to Misinformation.
CoRR, 2020

Understanding Perceptions of Smart Devices.
Proceedings of the Financial Cryptography and Data Security, 2020

Tech Pains: Characterizations of Lived Cybersecurity Experiences.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Effects of Credibility Indicators on Social Media News Sharing Intent.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted Email.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

How Mandatory Second Factor Affects the Authentication User Experience.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
It Is About What They Could Do with the Data: A User Perspective on Privacy in Smart Metering.
ACM Trans. Comput. Hum. Interact., 2019

Techies Against Facebook: Understanding Negative Sentiment Toward Facebook via User Generated Content.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Persuasive Information Security: Techniques to Help Employees Protect Organizational Information Security.
Proceedings of the Persuasive Technology - 11th International Conference, 2016

2015
Persuasive Information Security. A Behavior Change Support System to Help Employees Protect Organizational Information Security.
Proceedings of the Third International Workshop on Behavior Change Support Systems co-located with the 10th International Conference on Persuasive Technology (PERSUASIVE 2015), 2015

Give Social Network Users the Privacy They Want.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Engagement and Well-being on Social Network Sites.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Reflection or action?: how feedback and control affect location sharing decisions.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Peer-produced privacy protection.
Proceedings of the Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 IEEE International Symposium on Technology and Society, 2013

Attire: conveying information exposure through avatar apparel.
Proceedings of the Computer Supported Cooperative Work, 2013

RepliPRI: Challenges in Replicating Studies of Online Privacy.
Proceedings of the CHI 2013 Workshop on the Replication of HCI Research, 2013

2012
Privacy in instant messaging: an impression management model.
Behav. Inf. Technol., 2012

Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Will you be my friend?: responses to friendship requests from strangers.
Proceedings of the iConference 2012, Toronto, Ontario, Canada, February 7-10, 2012, 2012

My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules.
Proceedings of the Financial Cryptography and Data Security, 2012

Are you exposed?: conveying information exposure.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, 2012

"Check out where I am!": location-sharing motivations, preferences, and practices.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Methodological reflections on a field study of a globally distributed software project.
Inf. Softw. Technol., 2011

With a little help from my friends: can social navigation inform interpersonal privacy preferences?
Proceedings of the 2011 ACM Conference on Computer Supported Cooperative Work, 2011

2010
Enhancing privacy management support in instant messaging.
Interact. Comput., 2010

Comparing privacy attitudes of knowledge workers in the U.S. and India.
Proceedings of the 3rd international conference on Intercultural collaboration, 2010

Capstone Project: From Software Engineering to "Informatics".
Proceedings of the Proceedings 23rd IEEE Conference on Software Engineering Education and Training, 2010

2009
Privacy Considerations in Awareness Systems: Designing with Privacy in Mind.
Proceedings of the Awareness Systems - Advances in Theory, Methodology and Design, 2009

Interpersonal Privacy Management in Distributed Collaboration: Situational Characteristics and Interpretive Influences.
Proceedings of the Human-Computer Interaction, 2009

Public Disclosure versus Private Practice: Challenges in Business Process Management (Position Paper).
Proceedings of the Service-Oriented Computing. ICSOC/ServiceWave 2009 Workshops, 2009

2006
Privacy and HCI: methodologies for studying privacy issues.
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
"THAT's What I Was Looking For": Comparing User-Rated Relevance with Search Engine Rankings.
Proceedings of the Human-Computer Interaction, 2005

Uncovering privacy attitudes and practices in instant messaging.
Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, 2005

Who gets to know what when: configuring privacy permissions in an awareness application.
Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2004
Preserving Privacy in Awareness Systems.
Proceedings of the Wissen in Aktion, 2004


  Loading...