Yousra Javed

Orcid: 0000-0002-0293-9551

According to our database1, Yousra Javed authored at least 32 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
When WhatsApp changed its privacy policy: explaining WhatsApp discontinuation using an enablers-inhibitors' perspective.
Online Inf. Rev., 2024

Explaining technology migration against the change in terms of use: an fsQCA approach.
Inf. Technol. People, 2024

Replication: What Would Motivate Users to Use Gmail's Confidential Mode?
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

An Empirical Evaluation of the Current State of Phishing Comprehension in Pakistan.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Managing Access to Confidential Documents: A Case Study of an Email Security Tool.
Future Internet, 2023

2022
South Asian Website Privacy Policy Dataset.
Dataset, May, 2022

User Perceptions of Gmail's Confidential Mode.
Proc. Priv. Enhancing Technol., 2022

"Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Network Forensic Analysis of Twitter Application on Android OS.
Proceedings of the International Conference on Frontiers of Information Technology, 2022

2021
Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East.
Future Internet, 2021

Forensic Analysis of Tor Browser on Windows 10 and Android 10 Operating Systems.
IEEE Access, 2021

Automated Analysis of Pakistani Websites' Compliance with GDPR and Pakistan Data Protection Act.
Proceedings of the International Conference on Frontiers of Information Technology, 2021

2020
South Asian Website Privacy Policy Dataset.
Dataset, August, 2020

A Study of South Asian Websites on Privacy Compliance.
IEEE Access, 2020

The Impact of Advertisements on User Attention During Permission Authorization.
Proceedings of the HCI International 2020 - Late Breaking Papers: User Experience Design and Case Studies, 2020

Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Investigating Teenagers' Ability to Detect Phishing Messages.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Seniors' Media Preference for Receiving Internet Security Information: A Pilot Study.
CoRR, 2019

Visual Analysis of Photo Policy Misconfigurations Using Treemaps.
CoRR, 2019

Alexa's Voice Recording Behavior: A Survey of User Understanding and Awareness.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2017
Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions.
Proc. Priv. Enhancing Technol., 2017

Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Semi-supervised policy recommendation for online social networks.
Soc. Netw. Anal. Min., 2016

A Body of Knowledge for Usable Security and Privacy Education (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook.
Proceedings of the Data Privacy Management and Security Assurance, 2016

2013
Access Control Policy Misconfiguration Detection in Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Population density estimation using textons.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

How do Facebookers Use Friendlists.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Breaking undercover: exploiting design flaws and nonuniform human behavior.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

2009
Embedding a Covert Channel in Active Network Connections.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009


  Loading...