Andriotis, P., Stringhini, G., Sasse, M.A. (2018). Studying users’ adaptation to Android’s run-time fine-grained access control system. Journal of Information Security and Applications, doi:10.1016/j.jisa.2018.02.004 |
Becker, I., Hutchings, A., Abu-Salma, R., Anderson, R., Bohm, N., Murdoch, S.J., ...Stringhini, G. (2018). International comparison of bank fraud reimbursement: customer perceptions and contractual terms. Journal of Cybersecurity, 3 109-125. doi:10.1093/cybsec/tyx011 |
Becker, I., Parkin, S., Sasse, M.A. (2018). The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength. |
Demjaha, A., Spring, J.M., Becker, I., Parkin, S., Sasse, M.A. (2018). Metaphors Considered Harmful? An Exploratory Study of the Effectiveness of Functional Metaphors for End-to-End Encryption. |
Sombatruang, N., Kadobayashi, Y., Sasse, M.A., Baddeley, M., Miyamoto, D. (2018). The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. |
Warner, M., Gutmann, A., Sasse, M.A., Blandford, A. (2018). Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr. |
Weir, C.A.F., Blair, L., Noble, J., Becker, I., Sasse, M.A. (2018). Light-Touch Interventions to Improve Software Development Security. |
Abu-Salma, R., Krol, K., Parkin, S., Koh, V., Kwan, K., Mahboob, J., ...Sasse, M.A. (2017). The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram. |
Abu-Salma, R., Sasse, M.A., Bonneau, J., Danilova, A., Naiakshina, A., Smith, M. (2017). Obstacles to the Adoption of Secure Communication Tools. |
Becker, I.F., Parkin, S., Sasse, M.A. (2017). Finding Security Champions in Blends of Organisational Culture. |
Becker, I., Parkin, S., Sasse, M.A. (2017). Measuring the Success of Context-Aware Security Behaviour Surveys. |
Dodier-Lazaro, S., Abu-Salma, R., Becker, I., Sasse, M.A. (2017). From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design. |
Dodier-Lazaro, S., Becker, I., Krinke, J., Sasse, M. (2017). No Good Reason to Remove Features: Expert Users Value Useful Apps over Secure Ones. London: UCL Computer Science. |
Dodier-Lazaro, S., Becker, I., Krinke, J., Sasse, M.A. (2017). "No Good Reason to Remove Features" Expert Users Value Useful Apps over Secure Ones. |
Mauriés, J.R.P., Krol, K., Parkin, S., Abu-Salma, R., Sasse, M.A. (2017). Dead on Arrival: Recovering from Fatal Flaws in Email Encryption Tools. |
Murdoch, S.J., Becker, I., Abu-Salma, R., Anderson, R., Bohm, N., Hutchings, A., ...Stringhini, G. (2017). Are payment card contracts unfair? (Short paper). |
Whitty, M., Edwards, M., Levi, M., Peersman, C., Rashid, A., Sasse, M.A., ...Stringhini, G. (2017). Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF). |
Andriotis, P., Sasse, M.A., Stringhini, G. (2016). Permissions Snapshots: Assessing Users’ Adaptation to the Android Runtime Permission Model. |
Beautement, A., Becker, I., Parkin, S., Krol, K., Sasse, M.A. (2016). Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours. |
Becker, I., Hutchings, A., Abu-Salma, R., Anderson, R., Bohm, N., Murdoch, S.J., ...Stringhini, G. (2016). International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms. |
Becker, I., Parkin, S., Sasse, M.A. (2016). Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations. |
Caputo, D.D., Pfleeger, S.L., Sasse, M.A., Ammann, P., Offutt, J., Deng, L. (2016). Barriers to Usable Security? Three Organizational Case Studies. IEEE Security and Privacy, 14 (5), 22-32. doi:10.1109/MSP.2016.95 |
Glass, B., Jenkinson, G., Liu, Y., Sasse, M.A., Stajano, F. (2016). The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions. |
Kostkova, P., Brewer, H., de Lusignan, S., Fottrell, E., Goldacre, B., Hart, G., ...McKendry, R. (2016). Who Owns The Data? Open Data for health care. Fontiers in Public Health, 4 (7), doi:10.3389/fpubh.2016.00007 |
Krol, K., Parkin, S., Sasse, M.A. (2016). “I don’t like putting my face on the Internet!”: An acceptance study of face biometrics as a CAPTCHA replacement. |
Krol, K., Parkin, S., Sasse, M.A. (2016). Better the Devil You Know: A User Study of Two CAPTCHAs and a Possible Replacement. |
Krol, K., Spring, J.M., Parkin, S., Sasse, M.A. (2016). Towards robust experimental design for user studies in security and privacy. |
Parkin, S., Krol, K., Becker, I., Sasse, M.A. (2016). Applying Cognitive Control Modes to Identify Security Fatigue Hotspots. |
Sänger, J., Hänsch, N., Glass, B., Benenson, Z., Landwirth, R., Sasse, M.A. (2016). Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces. |
Sasse, M.A., Bada, M., Nurse, J. (2016). Security Awareness Campaigns: Why do they fail to change behaviour?. |
Sasse, M.A., Smith, M. (2016). The Security-Usability Tradeoff Myth [Guest editors' introduction]. IEEE Security and Privacy, 14 (5), 11-13. doi:10.1109/MSP.2016.102 |
Sasse, M.A., Smith, M., Herley, C., Lipford, H., Vaniea, K. (2016). Debunking Security-Usability Tradeoff Myths. IEEE SECURITY & PRIVACY, 14 (5), 33-39. |
Sombatruang, N., Sasse, M.A., Baddeley, M. (2016). Why do people use unsecure public Wi-Fi? An investigation of behaviour and factors driving decisions. |
Abu-Salma, R., Sasse, M.A., Bonneau, J., Smith, M. (2015). POSTER: Secure Chat for the Masses? User-centered Security to the Rescue. |
Beris, O., Beautement, A., Sasse, M.A. (2015). Employee Rule Breakers, Excuse Makers and Security Champions:: Mapping the Risk Perceptions and Emotions That Drive Security Behaviors. |
Gollmann, D., Herley, C., Koenig, V., Pieters, W., Sasse, M.A. (2015). Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports, 4 1-28. doi:10.4230/DagRep.4.12.1 |
Kirlappos, I., Parkin, S., Sasse, M.A. (2015). "Shadow security" as a tool for the learning organization. ACM SIGCAS Computers and Society, 45 (1), 29-37. doi:10.1145/2738210.2738216 |
Kirlappos, I., Sasse, M.A. (2015). Fixing Security Together: Leveraging trust relationships to improve security in organizations. |
Krol, K., Papanicolaou, C., Vernitski, A., Sasse, M.A. (2015). “Too taxing on the mind!” Authentication grids are not for everyone. |
Krol, K., Philippou, E., De Cristofaro, E., Sasse, M.A. (2015). "They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking. |
Parkin, S., Driss, S., Krol, K., Sasse, M.A. (2015). Assessing the User Experience of Password Reset Policies in a University. |
Sasse, A. (2015). Scaring and Bullying People into Security Won't Work. IEEE SECURITY & PRIVACY, 13 (3), 80-83. doi:10.1109/MSP.2015.65 |
Angela Sasse, M. (2014). "Technology should be smarter than this!": A vision for overcoming the great authentication fatigue. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8425 LNCS 33-36. doi:10.1007/978-3-319-06811-4_7 |
Bada, M., Sasse, A. (2014). Why do they fail to change behaviour?. . |
Jennett, C., Sasse, M.A. (2014). Is sending shops ads by Bluetooth just a bit creepy?. [Digital scholarly resource]. Retrieved from: http://theconversation.com/is-sending-shoppers-ads-by-bluetooth-just-a-bit-creepy-32643 |
Kirlappos, I., Parkin, S., Sasse, M.A. (2014). Learning from 'Shadow Security': Why understanding noncompliant behaviors provides the basis for effective security. |
Kirlappos, I., Sasse, M.A. (2014). What Usable Security Really Means: Trusting and Engaging Users. |
Morton, A.J., Sasse, M.A. (2014). Desperately Seeking Assurances: Segmenting Users by their Information-Seeking Preferences::A Q Methodology Study of Users’ Ranking of Privacy, Security & Trust Cues. |
Pfleeger, S.L., Sasse, M.A., Furnham, A. (2014). From Weakest Link to Security Hero: Transforming Staff Security Behavior. Journal of Homeland Security and Emergency Management, 11 (4), 489-510. doi:10.1515/jhsem-2014-0035 |
Porter, C., Letier, E., Sasse, M.A. (2014). Building a National E-Service using Sentire: Experience report on the use of Sentire: A Volere-based requirements framework driven by calibrated personas and simulated user feedback. |
Ruskov, M., Ekblom, P., Sasse, M.A. (2014). Towards a Simulation of Information Security Behaviour in Organisations. In Blackwell, C., Zhu, H. (Eds.), Cyberpatterns. (pp. 177-184). Springer International Publishing. |
Sasse, M.A., Kirlappos, I. (2014). Design for Trusted and Trustworthy Services: Why We Must Do Better.. In Trust, Computing, and Society. (pp. 229-249). Cambridge University Press. |
Sasse, M.A., Palmer, C.C. (2014). Protecting you. IEEE Security and Privacy, 12 (1), 11-13. doi:10.1109/MSP.2014.11 |
Sasse, M.A., Palmer, C.C., Jakobsson, M., Consolvo, S., Wash, R., Camp, L.J. (2014). Helping you protect you. IEEE Security and Privacy, 12 (1), 39-42. doi:10.1109/MSP.2014.4 |
Sasse, M.A., Steves, M., Krol, K., Chisnell, D. (2014). The Great Authentication Fatigue – And How to Overcome It. |
Steves, M., Chisnell, D., Sasse, A., Krol, K., Theofanos, M., Wald, H. (2014). Report: Authentication Diary Study. National Institute of Standards and Technology . |
Acquisti, A., Krontiris, I., Langheinrich, M., Sasse, M.A. (2013). 'My Life, Shared’-Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312). Dagstuhl Reports, 3 (7), 74-107. doi:10.4230/DagRep.3.7.74 |
Ashenden, D., Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy?. COMPUTERS & SECURITY, 39 396-405. doi:10.1016/j.cose.2013.09.004 |
Bartsch, S., Sasse, M.A. (2013). How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization.. |
Brostoff, S., Jennett, C., Malheiros, M., Sasse, M.A. (2013). Federated Identity to Access e-Government Services - Are Citizens Ready for This?. |
Huth, M., Kuo, J.H.P., Sasse, A., Kirlappos, I. (2013). Towards usable generation and enforcement of trust evidence from programmers' intent. |
Huth, M., Kuo, J.H., Sasse, M.A., Kirlappos, I. (2013). Towards Usable Generation and Enforcement of Trust Evidence from Programmers’ Intent. |
Kirlappos, I., Beautement, A., Sasse, M.A. (2013). "Comply or die" is dead: Long live security-aware principal agents. |
Malheiros, M., Brostoff, S., Jennett, C., Sasse, M.A. (2013). Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application.. In Böhme, R. (Ed.), The Economics of Information Security and Privacy. (pp. 237-261). Springer. |
Malheiros, M., Preibusch, S., Sasse, M.A. (2013). “Fairly Truthful”: The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure. |
Ruskov, M., Ekblom, P., Sasse, A. (2013). In Search for the Right Measure: Assessing Types of Developed Knowledge While Using a Gamified Web Toolkit. |
Sasse, M.A., Krol, K. (2013). Usable biometrics for an ageing population. In Fairhurst, M. (Ed.), Age factors in biometric processing. (pp. 303-320). Stevenage, UK: IET. |
Arnell, S., Beautement, A., Inglesant, P., Monahan, B., Pym, D., Sasse, M.A. (2012). Systematic Decision Making in Security Management Modelling Password Usage and Support. |
Bartsch, S., Sasse, M.A. (2012). Guiding decisions on authorization policies: a participatory approach to decision support. |
Bartsch, S., Sasse, M.A. (2012). How users bypass access control and why: the impact of authorization problems on individuals and the organization. London, UK: UCL Department of Computer Science. |
Conti, N., Jennett, C., Maestre, J., Sasse, M.A. (2012). When did my mobile turn into a 'sellphone'? A study of consumer responses to tailored smartphone ads. |
Jennett, C., Brostoff, S., Malheiros, M., Sasse, M.A. (2012). Adding insult to injury: consumer experiences of being denied credit. International Journal of Consumer Studies, 36 (5), 549-555. doi:10.1111/j.1470-6431.2012.01120.x |
Jennett, C., Malheiros, M., Brostoff, S., Sasse, M.A. (2012). Privacy for applicants versus lenders' needs for predictive power: Is it possible to bridge the gap?. In Gutwirth, S., Leenes, R., De Hert, P., Poullet, Y. (Eds.), (pp. 35-51). SpringerLink. |
Kirlappos, I., Sasse, M.A. (2012). Security Education against Phishing: A Modest Proposal for a Major Rethink. IEEE Security and Privacy Magazine, 10 (2), 24-32. doi:10.1109/MSP.2011.179 |
Kirlappos, I., Sasse, M.A., Harvey, N. (2012). Why Trust Seals Don’t Work: A Study of User Perceptions and Behavior. In Katzenbeisser, S., Weippl, E., Camp, L., Volkamer, M., Reiter, M., Zhang, X. (Eds.), Trust and Trustworthy Computing. (pp. 308-324). Berlin/Heidelberg: Springer. |
Krol, K., Moroz, M., Sasse, M.A. (2012). Don't work. Can't work? Why it's time to rethink security warnings. |
Malheiros, M., Brostoff, S., Jennett, C., Sasse, A. (2012). Would You Sell Your Mother’s Data? Personal Data Disclosure in a Simulated Credit Card Application. |
Malheiros, M., Jennett, C., Patel, S., Brostoff, S., Sasse, M.A. (2012). Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising. |
Morton, A., Sasse, M.A. (2012). Privacy is a process, not a PET: a theory for effective privacy practice. |
Porter, C., Sasse, M.A., Letier, E. (2012). Designing acceptable user registration processes for e-services. |
Probst, C.W., Sasse, M.A., Pieters, W., Dimkov, T., Luysterborg, E., Arnaud, M. (2012). Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider. In Gutwirth, S., Leenes, R., Hert, P.D., Poullet, Y. (Eds.), European Data Protection: In Good Health?. (pp. 251-265). Springer Netherlands. |
Rahaman, A., Sasse, M.A. (2012). Designing National Identity: An Organisational Perspective on Requirements for National Identity Management Systems. |
Ruskov, M., Celdran, J.M., Ekblom, P., Sasse, M.A. (2012). Unlocking the next level of crime prevention: development of a game prototype to teach the conjunction of criminal opportunity. Information Technologies and Control, 10 (8), 15-21. |
Sasse, M.A., Kirlappos, I. (2012). Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling. |
Wibbeke, A., Schöppner, V., Sasse, M. (2012). Self-reinforcement of uniaxially stretched polycarbonate film. |
Zhang, M., Jennett, C., Malheiros, M., Sasse, M.A. (2012). Data after death: User requirements and design challenges for SNSs and email providers. |
BEEHAREE, A.K., Laqua, S., Sasse, M.A. (2011). Navigating Haystacks at 70mph: Intelligent Search for Intelligent In-Car Services. |
Ben Abdesslem, F., Henderson, T., Brostoff, S., Sasse, M.A. (2011). Context-based Personalised Settings for Mobile Location Sharing. |
Beres, Y., Perrig, A., Sadeghi, A.R., Sasse, A. (2011). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface. . |
Inglesant, P.G., Sasse, M.A. (2011). Information Security as Organizational Power: A framework for re-thinking security policies. |
Jhawar, R., Inglesant, P.G., Sasse, M.A., Curtois, N.T. (2011). Make Mine a Quadruple: Strengthening the Security of Graphical One-Time PIN authentication. |
Koeberl, P., Li, J., Rajan, A., Vishik, C., Wu, W. (2011). A Practical Device Authentication Scheme Using SRAM PUFs.. |
Laqua, S., Sasse, M.A., Greenspan, S., Gates, C. (2011). Do you know dis?: a user study of a knowledge discovery tool for organizations. |
Malheiros, M., Jennett, C., Seager, W., Sasse, M. (2011). Trusting to Learn: Trust and Privacy Issues in Serious Games. In McCune, J., Balacheff, B., Perrig, A., Sadeghi, A.-.R., Sasse, A., Beres, Y. (Eds.), Trust and Trustworthy Computing. (pp. 116-130). Springer Berlin / Heidelberg. |
Sasse, M., Schöppner, V., Seibel, S., Becker, K. (2011). Expert database provides support for pipe extrusion. Kunststoffe International, 101 (12), 32-34. |
Seager, W., Ruskov, M., Sasse, M.A., Fradinho, M. (2011). Eliciting and modelling expertise for serious games in project management. Entertainment Computing, 2 doi:10.1016/j.entcom.2011.01.002 |
Beautement, A., Sasse, M.A. (2010). Gathering realistic authentication performance data through field trials. |
Brostoff, S., Inglesant, P., Sasse, M.A. (2010). Evaluating the usability and security of a graphical onetime PIN system. |
Brostoff, S., Inglesant, P., Sasse, M.A. (2010). Evaluating the usability and security of a graphical onetime PIN system. |
Brostoff, S., Inglesant, P., Sasse, M.A. (2010). Evaluating the usability and security of a graphical onetime PIN system. |
Brostoff, S., Inglesant, P., Sasse, M.A. (2010). Evaluating the usability and security of a graphical one-time PIN system. |
Fremont, G., Grazzini, S., Sasse, A., BEEHAREE, A. (2010). The SafeTRIP Project: Improving Road Safety for Passenger Vehicles using 2-way Satellite Communications. |
Inglesant, P.G., Sasse, M.A. (2010). The true cost of unusable password policies: password use in the wild. |
Inglesant, P., Sasse, M.A. (2010). Studying Password Use in the Wild: Practical Problems and Possible Solutions. |
Jennett, C., Brostoff, S., Malheiros, M., Sasse, M.A. (2010). Investigating loan applicants' perceptions of alternative data items and the effect of incentives on disclosure. |
Keval, H., Sasse, M.A. (2010). “ Not the Usual Suspects ” : A Study of Factors Reducing the Effectiveness of CCTV. Security Journal, 23 (2), 134-154. |
Parkin, S., van Moorsel, A., Inglesant, P., Sasse, M.A. (2010). A stealth approach to usable security: helping IT security managers to identify workable security solutions. |
Potente, K., Schöppner, V., Sasse, M., Seibel, S. (2010). Defects during extrusion processes - Recognize, analyze, graduate and eradicate. |
Rahaman, A., Sasse, M.A. (2010). A framework for the lived experience of identity. Identity in the Information Society, 3 (3), 605-638. doi:10.1007/s12394-010-0078-3 |
Rahaman, A., Sasse, M.A. (2010). Human-Centred Identity - From Rhetoric to Reality. |
Riegelsberger, J., Sasse, M.A. (2010). Ignore These At Your Peril: Ten principles for trust design. |
Ruskov, M., Seager, W., Sasse, M.A. (2010). Persuading Giants to be Wise:An Exploratory Study of Advice Sharing in Online Games. |
Sasse, M.A. (2010). Not Seeing the Crime for the Cameras?. COMMUNICATIONS OF THE ACM, 53 (2), 22-25. doi:10.1145/1646353.1646363 |
Seager, W., Ruskov, M., Sasse, M.A., Fradinho, M. (2010). Eliciting and modelling expertise for serious game design. |
Beautement, A., Coles, R., Griffin, J., Ioannidis, C., Monahan, B., Pym, D., ...Wonham, M. (2009). Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. |
Beautement, A., Sasse, A. (2009). The economics of user effort in information security. Computer Fraud & Security, 2009 (10), 8-12. doi:10.1016/S1361-3723(09)70127-7 |
BEAUTEMENT, A., Sasse, M.A. (2009). The Compliance Budget: The economics of user effort in information security. Computer Fraud & Security, 2009 (10), 8-12. doi:10.1016/S1361-3723(09)70127-7 |
Chadwick, D., Inglesant, P., Shi, L.L., Sasse, M.A. (2009). Writing Security Policies in Natural Language. Public Service Review: Home Affairs, (17), |
Flechais, I., Sasse, M.A. (2009). Stakeholder Involvement, Motivation, Responsibility, Communication: How to Design Usable Security in e-Science. International Journal of Human-Computer Studies, 67 (4), 281-296. |
Knoche, H., Sasse, M.A. (2009). The Big Picture on Small Screens Delivering Acceptable Video Quality in Mobile TV. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 5 (3), 20:1-20:27. doi:10.1145/1556134.1556137 |
Laqua, S., Sasse, M.A. (2009). Exploring Blog Spaces: A Study of Blog Reading Experiences using Dynamic Contextual Displays. |
Laqua, S., Sasse, M.A., Gates, C., Greenspan, S. (2009). Making Sense of the Unknown: Knowledge Dissemination in Organizations. |
Sasse, M.A., Johnson, G.I., Briggs, P. (2009). Introducing word processing to novice users: A study of 'procedural' and 'conceptual' approaches. Contemporary Ergonomics 1984-2008: Selected Papers and an Overview of the Ergonomics Society Annual Conference, 146-151. |
Sasse, M.A., Karat, C.-.M., Maxion, R.A. (2009). Designing and evaluating usable security and privacy technology.. |
Beautement, A., Sasse, M.A., Wonham, M. (2008). The compliance budget: managing security behaviour in organisations. |
Chadwick, D.W., Shil, L.L., Sasse, M.A., Inglesant, P. (2008). Interface intelligence. |
Coles, R., Griffin, J., Johnson, H., Monahan, B., Parkin, S.E., Pym, D., ...van Moorsel, A. (2008). Trust Economics Feasibility Study. |
Inglesant, P., Sasse, M.A., Chadwick, D., Shi, L.L. (2008). Expressions of Expertness: The Virtuous Circle of Natural Language for Access Control Policy Specification. |
Keval, H.U., Sasse, M.A. (2008). Can we ID from CCTV? Image quality in digital CCTV and face identification performance. |
Keval, H.U., Sasse, M.A. (2008). To catch a thief - you need at least 8 frames per second: the impact of frame rates on user performance in a CCTV detection task.. |
Knoche, H., Sasse, M.A. (2008). The sweet spot: How people trade off size and definition on mobile devices. |
Knoche, H., Sasse, M.A. (2008). Getting the big picture on small screens: Quality of experience in mobile TV. In Ahmad, A.M.A., Ibrahim, I.K. (Eds.), Multimedia Transcoding in Mobile and Wireless Networks. (pp. 31-46). Hershey, PA, USA: IGI Global. |
Oshlyansky, L., Cairns, P., Sasse, A., Harrison, C. (2008). The challenges faced by academia preparing students for industry: What we teach and what we do. |
Sasse, M.A. (2008). Comment and analysis: Angela Sasse on the vulnerability of biometric security. |
Ball, L.J., Sasse, M.A., Sas, C., Ormerod, T.C., Dix, A., Bagnall, P., McEwan, T. (2007). Preface: "HCI... but not as we know it". People and Computers XXI HCI.But Not as We Know It - Proceedings of HCI 2007: The 21st British HCI Group Annual Conference, 1 |
Boccolini, G., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., Muster, D., ...Pala, G. (2007). UNIC: A novel bi-directional satellite-based platform to provide TV-centric triple play services. |
Boccolini, G., Luise, M., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., ...Sasse, M.A. (2007). A two-way interactive broadband satellite architecture to break the digital divide barrier. |
Boccolini, G., Luise, M., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., ...Sasse, M.A. (2007). TV-Centric Technologies To Provide Remote Areas With Two-Way Satellite Broadband Access. |
Bonhard, P., Sasse, A., Harries, C. (2007). “The Devil You Know Knows Best” – How Online Recommendations Can Benefit From Social Networking. |
Flechais, I., Mascolo, C., Sasse, M.A. (2007). Integrating security and usability into the requirements and design process. International Journal of Electronic Security and Digital Forensics, 1 (1), 12-26. doi:10.1504/IJESDF.2007.013589 |
Inglesant, P., Sasse, M.A. (2007). Usability is the best policy: public policy and the lived experience of transport systems in London. |
Knoche, H., McCarthy, J., Sasse, M.A. (2007). How low can you go? The effect of low resolutions on shot types in mobile TV. Multimedia Tools and Applications, 145-166. doi:10.1007/s11042-006-0076-5 |
Knoche, H., Papaleo, M., Sasse, M.A., Vanelli-Coralli, A. (2007). The Kindest Cut: Enhancing the User Experience of Mobile TV through Adequate Zooming. |
Laqua, S., Bandara, S.U., Sasse, M.A. (2007). GazeSpace: eye gaze controlled content spaces. |
Laqua, S., Ogbechie, N., Sasse, M.A. (2007). Contextualizing the Blogosphere: A Comparison ofTraditional and Novel User Interfaces for the Web. |
Riegelsberger, J., Sasse, A., McCarthy, J.D. (2007). Trust in Mediated Interactions. In Joinson, A., McKenna, K.Y.A.P., T, R., U, D. (Eds.), Oxford Handbook of Internet Psychology. (pp. 53-69). Oxford: Oxford University Press. |
Sasse, M.A. (2007). Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A user experience of biometric airport systems. IEEE SECURITY & PRIVACY, 7 78-81. |
Seager, W., Knoche, H., Sasse, M.A. (2007). TV-centricity - Requirements gathering for triple play services.. |
Bonhard, P., Harries, C., McCarthy, J.D., Sasse, M.A. (2006). Accounting for Taste: Using Profile Similarity to Improve Recommender Systems. |
Bonhard, P., Sasse, M.A. (2006). 'Knowing me, knowing you' - using profiles and social networking to improve recommender systems. BT Technology Journal, 24 (3), 84-98. |
Chadwick, D., Sasse, M.A. (2006). The Virtuous Circle of Expressing Authorisation Policies. |
Knoche, H., McCarthy, J.D., Sasse, M.A. (2006). A close-up on Mobile TV: The effect of low resolutions on shot types. |
Knoche, H., Sasse, M.A. (2006). Breaking the news on mobile TV: user requirements of a popular mobile content.. |
Knoche, H., Sasse, M.A., McCarthy, J.D. (2006). Reading the Fine Print: The Effect of Text Legibility on Perceived Video Quality in Mobile TV. |
Laqua, S., Patel, G., Sasse, M.A. (2006). Personalised Focus-Metaphor Interfaces: An Eye Tracking Study on User Confusion. |
Sasse, A., Stewart, J., Aftelak, A., Nelissen, H., Ahn, J.Y., Steinhage, A., ...Pollington, D. (2006). User Requirements and Expectations. In Technologies for the Wireless Future: Wireless World Research Forum (WWRF). (pp. 15-58). . |
Sasse, M.A., Knoche, H. (2006). Quality in Context - an ecological approach to assessing QoS for mobile TV. |
Tafazolli, R., Uusitalo, M., Sasse, A., Arbanowski, S., Falconer, D., Fettweis, G., ...Sarma, A. (2006). Technologies for the Wireless Future: Wireless World Research Forum (WWRF). . |
Bonhard, P., Sasse, M.A. (2005). "I thought it was terrible and everyone else loved it" - A New Perspective for Effective Recommender System Design. |
Brostoff, S., Sasse, M.A., Chadwick, D., Cunningham, J., Mbanaso, U., Otenko, S. (2005). "R-What?" Development of a Role-Based Access Control (RBAC) Policy-Writing Tool for e-Scientists. Software Practice and Experience, 35 (9), 835-856. doi:10.1002/spe.691 |
Flechais, I., Riegelsberger, J., Sasse, M.A. (2005). Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems. |
Inglesant, P., Sasse, M.A. (2005). Situating the transient user: overcomingchallenges in the design of e-governmentsystems. |
Inglesant, P., Sasse, M.A. (2005). Usability is a policy issue: Minimising the "Hassle Factor" in mobile payment of the Central London Congestion Charge. |
Knoche, H., McCarthy, J.D., Sasse, M.A. (2005). Can small be beautiful?: assessing image resolution requirements for mobile TV. |
McCarthy, J.D., Riegelsberger, J., Sasse, M.A. (2005). Commercial uses of eye tracking. |
Riegelsberger, J., Sasse, A., McCarthy, J.D. (2005). Rich media, poor judgement? A study of media effects on users' trust in expertise. |
Riegelsberger, J., Sasse, M.A., McCarthy, J. (2005). Depending on the Kindness of Strangers? Trust Relationships in Ambient Societies.. |
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2005). The Mechanics of Trust: A Framework for Research and Design. International Journal of Human-Computer Studies, 62 (3), 381-422. doi:10.1016/j.ijhcs.2005.01.001 |
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2005). Do people trust their eyes more than ears?: media bias in detecting cues of expertise. |
Sasse, M.A. (2005). Usability and Trust in Information Systems. In Mansell, R., Collins, B. (Eds.), Trust and Crime in Information Societies. (pp. 319-348). Cheltenham, UK: Edward Elgar. |
Sasse, M.A., Flechais, I. (2005). Usable Security: Why Do We Need It? How Do We Get It?. In Cranor, L.F., Garfinkel, S. (Eds.), Security and Usability: Designing secure systems that people can use. (pp. 13-30). Sebastopol, US: O'Reilly. |
Scholl, J., Parnes, P., McCarthy, J.D., Sasse, M.A. (2005). Designing a large-scale video chat application. |
Boardman, R., Sasse, M.A. (2004). “Stuff Goes into the Computer and Doesn’t Come Out”: A Cross-tool Study of Personal Information Management. |
Crisler, K., Turner, T., Aftelak, A., Visciola, M., Steinhage, A., Anneroth, M., ...Tscheligi, M. (2004). Considering the User in the Wireless World. IEEE Communications Magazine, 42 (9), 56-62. doi:10.1109/MCOM.2004.1336721 |
McCarthy, J.D., Sasse, M.A., Miras, D. (2004). Sharp or Smooth? Comparing the effects of quantization vs. frame rate for streamed video. |
McCarthy, J.D., Sasse, M.A., Riegelsberger, J. (2004). The Geometry of Web Search. |
Schulzrinne, H., Dimitrova, N., Sasse, M.A., Moon, S.B., Lienhart, R. (Eds.), (2004). Proceedings of the 12th ACM International Conference on Multimedia, New York, NY, USA, October 10-16, 2004. ACM. |
Schulzrinne, H., Dimitrova, N., Sasse, M.A., Moon, S.B., Lienhart, R. (Eds.), (2004). MULTIMEDIA ’04: Proceedings of the 12th annual ACM international conference on Multimedia. New York, NY, USA: ACM. |
Wilson, G.M., Sasse, M.A. (2004). From doing to being: getting closer to the user experience. Interacting with Computers, 16 (4), 697-705. |
Boardman, R., Spence, R., Sasse, M.A. (2003). Too many hierarchies? The daily struggle for control of the workspace. |
Brostoff, S., Sasse, M.A. (2003). “Ten strikes and you're out”: Increasing the number of login attempts can improve password usability. |
Flechais, I., Sasse, M.A., Hailes, S. (2003). Bringing Security Home: A Process for Developing Secure and Usable Systems. |
Garau, M., Slater, M., Vinayagamoorthy, V., Brogni, A., Steed, A., Sasse, M.A. (2003). The impact of avatar realism and eye gaze control on perceived quality of communication in a shared immersive virtual environment.. |
McCarthy, J.D., Sasse, M.A., Riegelsberger, J. (2003). Could I have the Menu Please? An Eyetracking Study of Design Conventions. |
Monthienvichienchai, R., Sasse, M.A. (2003). Learning from Others' Mistakes Through Computer Supported Vicarious Learning. |
Riegelsberger, J., Sasse, M.A. (2003). Designing E-Commerce Applications for Consumer Trust. In Petrovic, O., Ksela, M., Fallenbock, M., Kittl, C. (Eds.), Trust in the Network Economy. (pp. 97-110). Wien, New York: Springer. |
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). Shiny Happy People Building Trust? Photos on e-commerce Websites and Consumer Trust. |
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). Trust at First Sight? A Test of Users' Ability to Identify Trustworthy e-commerce Sites. |
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). The Researcher's Dilemma: Evaluating Trust in Computer Mediated Communications. International Journal of Human-Computer Studies, 58 (6), 759-781. doi:10.1016/S1071-5819(03)00042-9 |
Sasse, M.A. (2003). Computer Security:Anatomy of a Usability Disaster, and a Plan for Recovery. |
Boardman, R., Sasse, M.A., Spence, R. (2002). Life Beyond the Mailbox: A Cross-Tool Perspective on Personal Information Management. |
Bruneau, D., Sasse, M.A., McCarthy, J.D. (2002). The Eyes Never Lie: The Use of Eyetracking Data in HCI Research. |
Crisler, K., Anneroth, M., Sasse, M.A., Pulli, P. (2002). A User-Focused ReferenceModel for WirelessSystems Beyond 3G. Eindhoven . |
Monthivienchienchai, R., Sasse, M.A., Wheeldon, R. (2002). Educational Metadata: Friendly Fire?. In Hazemi, R., Hailes, S. (Eds.), Support for Authoring and Managing Web-based coursework:. (pp. 203-214). Springer. |
Reigelberger, J., Sasse, M.A. (2002). Face It - Photos Don't Make a Web Site Trustworthy. |
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2002). Eye-catcher or blind spot?. |
Sasse, M.A., Monthienivichienchai, R., Harris, C., Ismail, I., Wheeldon, R. (2002). The TACO Project. In Hazemi, R., Hailes, S. (Eds.), Support for Authoring and Managing Web-based coursework. (pp. 139-132). Springer. |
Sasse, M.A., Monthienvichienchai, R. (2002). Computer Support for Vicarious Learning. |
Sheeran, A., Sasse, M.A., Rimmer, J., Wakeman, I. (2002). How Web Browsers Shape User's Understanding of Networks. The Electronic Library, 20 (1), 35-42. |
Terveen, L., Wixon, D., Comstoc, E., Sasse, M.A. (2002). Changing the World, Changing Ourselves. |
(2001). How web browsers shape users' understanding of networks. |
(2001). Conducting audio and video quality assessment based on HCI evaluation principles. ERCIM News, 46 41-42. |
Adams, A., Sasse, M.A. (2001). Privacy in multimedia communications: protecting users, not just data. |
Bouch, A., Sasse, M.A. (2001). Not all bits have equal value: Investigating users' network QoS requirements. |
Bouch, A., Sasse, M.A. (2001). Designing QoS and charging mechanisms: he who pays the service shapes the design. |
Bouch, A., Sasse, M.A. (2001). Why value is everything: A user centred approach to network Quality of Service and pricing. |
Bouch, A., Wilson, G., Sasse, M.A. (2001). A 3-dimensional approach to measuring end-user quality of service. |
Brostoff, S., Sasse, M.A. (2001). Safe and sound: a safety-critical design approach to security. |
Garau, M., Slater, M., Bee, S., Sasse, M.A. (2001). The impact of eye gaze on communication using humanoid avatars. |
Monthienvichienchai, R., Sasse, M.A., Wheeldon, R. (2001). There's trouble in paradise: problems with educational metadata encountered during the MALTED project. |
Monthienvichienchai, R., Sasse, M.A., Wheeldon, R. (2001). Educational metadata - friend or foe?. |
Pitt, J.V., Sasse, M.A. (2001). Privacy in collaborative multimedia environments. |
Riegelsberger, J., Sasse, M.A. (2001). Trustbuilders and trustbusters: the role of trust cues in interfaces to e-commerce applications. |
Sasse, M.A., Brostoff, S., Weirich, D. (2001). Transforming the "weakest link": a human-computer interaction approach to usable and effective security. BT Technology Journal, 19 122-131. |
Weirich, D., Sasse, M.A. (2001). Persuasive password security. |
Weirich, D., Sasse, M.A. (2001). Pretty good persuasion: A first step towards effective password security for the real world. |
Wilson, G., Sasse, M.A. (2001). Straight from the heart: using physiological measurements in the evaluation of multimedia quality. |
Bouch, A., Sasse, M.A. (2000). The case for predictable media quality in networked multimedia applications. |
Bouch, A., Sasse, M.A., DeMeer, H. (2000). Of packets and people: A user-centered approach to quality of service. |
Brostoff, S., Sasse, M.A. (2000). Are passfaces more usable than passwords? A field trail investigation. |
Rielgelsberger, J., Sasse, M.A. (2000). Trust me, I'm a .com. InterMedia, 28 (4), 23-27. |
Rimmer, J., Wakeman, I., Sheeran, L., Sasse, M.A. (2000). Messages from a tangled web. |
Sheeran, L., Sasse, M.A., Rimmer, J., Wakeman, I. (2000). Back to basics: is a better understanding of the Internet a precursor for effective use of the web?. |
Watson, A., Sasse, M.A. (2000). Distance education via IP videoconferencing: results from a national pilot project. |
Watson, A., Sasse, M.A. (2000). The good, the bad and the muffled: the impact of different degradations on internet speech. |
Wilson, G.M., Sasse, M.A. (2000). The head or the heart? Measuring the impact of media quality. |
Wilson, G.M., Sasse, M.A. (2000). Listen to Your Heart Rate: Counting the Cost of Media Quality.. In Paivia, A. (Ed.), Affective Interactions - Towards a New Generation of Computer Interfaces. (pp. 9-20). Springer-Verlag. |
Wilson, G.M., Sasse, M.A. (2000). Investigating the impact of audio degradations on users: subjective vs objective assessment methods. |
Wilson, G., Sasse, M.A. (2000). Do users always know what's good for them?Utilising physiological responses to assess media quality. |
Hardman, V., Sasse, M.A., Kouvelas, I. (1998). Successful multiparty audio communication over the Internet. Communications of the ACM, 41 (5), 74-80. doi:10.1145/274946.274959 |
Hughes, J., Sasse, M.A. (1998). Design to Instruct: Lessons for Training ThroughInvolving Teachers in Design.. |
Sasse, M.A., Clark, L., Perkins, C. (1998). Piloting IP multicast conferencing over SuperJANET: the PIPVIC Project. |
Sasse, M.A., Harris, C., Ismail, I., Monthienvichienchai, P. (1998). Support for authoring and managing web-based coursework: the TACO Project. In Hazemi, R., Hailes, S., Wilbur, S. (Eds.), The Digital University: Reinventing the Academy. (pp. 155-175). Berlin: Springer-Verlag. |
Watson, A., Sasse, M.A. (1998). Measuring perceived quality of speech and video in multimedia conferencing applications. |