M. Angela Sasse's list of publications

Publications

2017

Abu-Salma, R., Krol, K., Parkin, S., Koh, V., Kwan, K., Mahboob, J., ...Sasse, M.A. (2017). The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram.
Abu-Salma, R., Sasse, M.A., Bonneau, J., Danilova, A., Naiakshina, A., Smith, M. (2017). Obstacles to the Adoption of Secure Communication Tools.
Becker, I.F., Parkin, S., Sasse, M.A. (2017). Finding Security Champions in Blends of Organisational Culture.
Dodier-Lazaro, S., Abu-Salma, R., Becker, I., Sasse, M.A. (2017). From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design.
Dodier-Lazaro, S., Becker, I., Krinke, J., Sasse, M. (2017). No Good Reason to Remove Features: Expert Users Value Useful Apps over Secure Ones. London: UCL Computer Science.
Dodier-Lazaro, S., Becker, I., Krinke, J., Sasse, M.A. (2017). "No Good Reason to Remove Features" Expert Users Value Useful Apps over Secure Ones.
Murdoch, S.J., Becker, I., Abu-Salma, R., Anderson, R., Bohm, N., Hutchings, A., ...Stringhini, G. (2017). Are payment card contracts unfair? (Short paper).
Whitty, M., Edwards, M., Levi, M., Peersman, C., Rashid, A., Sasse, M.A., ...Stringhini, G. (2017). Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).

2016

Andriotis, P., Sasse, M.A., Stringhini, G. (2016). Permissions Snapshots: Assessing Users’ Adaptation to the Android Runtime Permission Model.
Beautement, A., Becker, I., Parkin, S., Krol, K., Sasse, M.A. (2016). Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.
Becker, I., Hutchings, A., Abu-Salma, R., Anderson, R., Bohm, N., Murdoch, S.J., ...Stringhini, G. (2016). International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
Becker, I., Parkin, S., Sasse, M.A. (2016). Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations.
Caputo, D.D., Pfleeger, S.L., Sasse, M.A., Ammann, P., Offutt, J., Deng, L. (2016). Barriers to Usable Security? Three Organizational Case Studies. IEEE Security and Privacy, 14 (5), 22-32. doi:10.1109/MSP.2016.95
Glass, B., Jenkinson, G., Liu, Y., Sasse, M.A., Stajano, F. (2016). The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions.
Kostkova, P., Brewer, H., de Lusignan, S., Fottrell, E., Goldacre, B., Hart, G., ...McKendry, R. (2016). Who Owns The Data? Open Data for health care. Fontiers in Public Health, 4 (7), doi:10.3389/fpubh.2016.00007
Krol, K., Parkin, S., Sasse, M.A. (2016). “I don’t like putting my face on the Internet!”: An acceptance study of face biometrics as a CAPTCHA replacement.
Krol, K., Parkin, S., Sasse, M.A. (2016). Better the Devil You Know: A User Study of Two CAPTCHAs and a Possible Replacement.
Krol, K., Spring, J.M., Parkin, S., Sasse, M.A. (2016). Towards robust experimental design for user studies in security and privacy.
Parkin, S., Krol, K., Becker, I., Sasse, M.A. (2016). Applying Cognitive Control Modes to Identify Security Fatigue Hotspots.
Sänger, J., Hänsch, N., Glass, B., Benenson, Z., Landwirth, R., Sasse, M.A. (2016). Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces.
Sasse, M.A., Smith, M. (2016). The Security-Usability Tradeoff Myth [Guest editors' introduction]. IEEE Security and Privacy, 14 (5), 11-13. doi:10.1109/MSP.2016.102
Sasse, M.A., Smith, M. (2016). The Security-Usability Tradeoff Myth. IEEE SECURITY & PRIVACY, 14 (5), 11-13.
Sasse, M.A., Smith, M., Herley, C., Lipford, H., Vaniea, K. (2016). Debunking Security-Usability Tradeoff Myths. IEEE SECURITY & PRIVACY, 14 (5), 33-39.

2015

Abu-Salma, R., Sasse, M.A., Bonneau, J., Smith, M. (2015). POSTER: Secure chat for the masses? User-centered security to the rescue.
Beris, O., Beautement, A., Sasse, M.A. (2015). Employee Rule Breakers, Excuse Makers and Security Champions:: Mapping the Risk Perceptions and Emotions That Drive Security Behaviors.
Gollmann, D., Herley, C., Koenig, V., Pieters, W., Sasse, M.A. (2015). Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports, 4 1-28. doi:10.4230/DagRep.4.12.1
Kirlappos, I., Parkin, S., Sasse, M.A. (2015). "Shadow security" as a tool for the learning organization. ACM SIGCAS Computers and Society, 45 (1), 29-37. doi:10.1145/2738210.2738216
Kirlappos, I., Sasse, M.A. (2015). Fixing Security Together: Leveraging trust relationships to improve security in organizations.
Krol, K., Papanicolaou, C., Vernitski, A., Sasse, M.A. (2015). “Too taxing on the mind!” Authentication grids are not for everyone.
Krol, K., Philippou, E., De Cristofaro, E., Sasse, M.A. (2015). "They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking.
Parkin, S., Driss, S., Krol, K., Sasse, M.A. (2015). Assessing the User Experience of Password Reset Policies in a University.
Sasse, A. (2015). Scaring and Bullying People into Security Won't Work. IEEE SECURITY & PRIVACY, 13 (3), 80-83. doi:10.1109/MSP.2015.65

2014

Angela Sasse, M. (2014). "Technology should be smarter than this!": A vision for overcoming the great authentication fatigue. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8425 LNCS 33-36. doi:10.1007/978-3-319-06811-4_7
Bada, M., Sasse, A. (2014). Why do they fail to change behaviour?. .
Jennett, C., Sasse, M.A. (2014). Is sending shops ads by Bluetooth just a bit creepy?. [Digital scholarly resource]. Retrieved from: http://theconversation.com/is-sending-shoppers-ads-by-bluetooth-just-a-bit-creepy-32643
Kirlappos, I., Parkin, S., Sasse, M.A. (2014). Learning from 'Shadow Security': Why understanding noncompliant behaviors provides the basis for effective security.
Kirlappos, I., Sasse, M.A. (2014). What Usable Security Really Means: Trusting and Engaging Users.
Morton, A.J., Sasse, M.A. (2014). Desperately Seeking Assurances: Segmenting Users by their Information-Seeking Preferences::A Q Methodology Study of Users’ Ranking of Privacy, Security & Trust Cues.
Pfleeger, S.L., Sasse, M.A., Furnham, A. (2014). From Weakest Link to Security Hero: Transforming Staff Security Behavior. Journal of Homeland Security and Emergency Management, 11 (4), 489-510. doi:10.1515/jhsem-2014-0035
Porter, C., Letier, E., Sasse, M.A. (2014). Building a National E-Service using Sentire: Experience report on the use of Sentire: A Volere-based requirements framework driven by calibrated personas and simulated user feedback.
Ruskov, M., Ekblom, P., Sasse, M.A. (2014). Towards a Simulation of Information Security Behaviour in Organisations. In Blackwell, C., Zhu, H. (Eds.), Cyberpatterns. (pp. 177-184). Springer International Publishing.
Sasse, M.A., Kirlappos, I. (2014). Design for Trusted and Trustworthy Services: Why We Must Do Better.. In Trust, Computing, and Society. (pp. 229-249). Cambridge University Press.
Sasse, M.A., Palmer, C.C. (2014). Protecting you. IEEE Security and Privacy, 12 (1), 11-13. doi:10.1109/MSP.2014.11
Sasse, M.A., Palmer, C.C., Jakobsson, M., Consolvo, S., Wash, R., Camp, L.J. (2014). Helping you protect you. IEEE Security and Privacy, 12 (1), 39-42. doi:10.1109/MSP.2014.4
Sasse, M.A., Steves, M., Krol, K., Chisnell, D. (2014). The Great Authentication Fatigue – And How to Overcome It.
Steves, M., Chisnell, D., Sasse, A., Krol, K., Theofanos, M., Wald, H. (2014). Report: Authentication Diary Study. National Institute of Standards and Technology .

2013

Acquisti, A., Krontiris, I., Langheinrich, M., Sasse, M.A. (2013). 'My Life, Shared’-Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312). Dagstuhl Reports, 3 (7), 74-107. doi:10.4230/DagRep.3.7.74
Ashenden, D., Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy?. COMPUTERS & SECURITY, 39 396-405. doi:10.1016/j.cose.2013.09.004
Bartsch, S., Sasse, M.A. (2013). How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization..
Brostoff, S., Jennett, C., Malheiros, M., Sasse, M.A. (2013). Federated Identity to Access e-Government Services - Are Citizens Ready for This?.
Huth, M., Kuo, J.H., Sasse, M.A., Kirlappos, I. (2013). Towards Usable Generation and Enforcement of Trust Evidence from Programmers’ Intent.
Kirlappos, I., Beautement, A., Sasse, M.A. (2013). "Comply or die" is dead: Long live security-aware principal agents.
Malheiros, M., Brostoff, S., Jennett, C., Sasse, M.A. (2013). Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application.. In Böhme, R. (Ed.), The Economics of Information Security and Privacy. (pp. 237-261). Springer.
Malheiros, M., Preibusch, S., Sasse, M.A. (2013). “Fairly Truthful”: The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure.
Ruskov, M., Ekblom, P., Sasse, A. (2013). In Search for the Right Measure: Assessing Types of Developed Knowledge While Using a Gamified Web Toolkit.
Sasse, M.A., Krol, K. (2013). Usable biometrics for an ageing population. In Fairhurst, M. (Ed.), Age factors in biometric processing. (pp. 303-320). Stevenage, UK: IET.

2012

Arnell, S., Beautement, A., Inglesant, P., Monahan, B., Pym, D., Sasse, M.A. (2012). Systematic Decision Making in Security Management Modelling Password Usage and Support.
Bartsch, S., Sasse, M.A. (2012). Guiding decisions on authorization policies: a participatory approach to decision support.
Bartsch, S., Sasse, M.A. (2012). How users bypass access control and why: the impact of authorization problems on individuals and the organization. London, UK: UCL Department of Computer Science.
Conti, N., Jennett, C., Maestre, J., Sasse, M.A. (2012). When did my mobile turn into a 'sellphone'? A study of consumer responses to tailored smartphone ads.
Jennett, C., Brostoff, S., Malheiros, M., Sasse, M.A. (2012). Adding insult to injury: consumer experiences of being denied credit. International Journal of Consumer Studies, 36 (5), 549-555. doi:10.1111/j.1470-6431.2012.01120.x
Jennett, C., Malheiros, M., Brostoff, S., Sasse, M.A. (2012). Privacy for applicants versus lenders' needs for predictive power: Is it possible to bridge the gap?. In Gutwirth, S., Leenes, R., De Hert, P., Poullet, Y. (Eds.), (pp. 35-51). SpringerLink.
Kirlappos, I., Sasse, M.A. (2012). Security Education against Phishing: A Modest Proposal for a Major Rethink. IEEE Security and Privacy Magazine, 10 (2), 24-32. doi:10.1109/MSP.2011.179
Kirlappos, I., Sasse, M.A., Harvey, N. (2012). Why Trust Seals Don’t Work: A Study of User Perceptions and Behavior. In Katzenbeisser, S., Weippl, E., Camp, L., Volkamer, M., Reiter, M., Zhang, X. (Eds.), Trust and Trustworthy Computing. (pp. 308-324). Berlin/Heidelberg: Springer.
Krol, K., Moroz, M., Sasse, M.A. (2012). Don't work. Can't work? Why it's time to rethink security warnings.
Malheiros, M., Brostoff, S., Jennett, C., Sasse, A. (2012). Would You Sell Your Mother’s Data? Personal Data Disclosure in a Simulated Credit Card Application.
Malheiros, M., Jennett, C., Patel, S., Brostoff, S., Sasse, M.A. (2012). Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising.
Morton, A., Sasse, M.A. (2012). Privacy is a process, not a PET: a theory for effective privacy practice.
Porter, C., Sasse, M.A., Letier, E. (2012). Designing acceptable user registration processes for e-services.
Probst, C.W., Sasse, M.A., Pieters, W., Dimkov, T., Luysterborg, E., Arnaud, M. (2012). Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider. In Gutwirth, S., Leenes, R., Hert, P.D., Poullet, Y. (Eds.), European Data Protection: In Good Health?. (pp. 251-265). Springer Netherlands.
Rahaman, A., Sasse, M.A. (2012). Designing National Identity: An Organisational Perspective on Requirements for National Identity Management Systems.
Ruskov, M., Celdran, J.M., Ekblom, P., Sasse, M.A. (2012). Unlocking the next level of crime prevention: development of a game prototype to teach the conjunction of criminal opportunity. Information Technologies and Control, 10 (8), 15-21.
Sasse, M.A., Kirlappos, I. (2012). Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling.
Zhang, M., Jennett, C., Malheiros, M., Sasse, M.A. (2012). Data after death: User requirements and design challenges for SNSs and email providers.

2011

BEEHAREE, A.K., Laqua, S., Sasse, M.A. (2011). Navigating Haystacks at 70mph: Intelligent Search for Intelligent In-Car Services.
Ben Abdesslem, F., Henderson, T., Brostoff, S., Sasse, M.A. (2011). Context-based Personalised Settings for Mobile Location Sharing.
Inglesant, P.G., Sasse, M.A. (2011). Information Security as Organizational Power: A framework for re-thinking security policies.
Jhawar, R., Inglesant, P.G., Sasse, M.A., Curtois, N.T. (2011). Make Mine a Quadruple: Strengthening the Security of Graphical One-Time PIN authentication.
Koeberl, P., Li, J., Rajan, A., Vishik, C., Wu, W. (2011). A Practical Device Authentication Scheme Using SRAM PUFs..
Laqua, S., Sasse, M.A., Greenspan, S., Gates, C. (2011). Do you know dis?: a user study of a knowledge discovery tool for organizations.
Malheiros, M., Jennett, C., Seager, W., Sasse, M. (2011). Trusting to Learn: Trust and Privacy Issues in Serious Games. In McCune, J., Balacheff, B., Perrig, A., Sadeghi, A.-.R., Sasse, A., Beres, Y. (Eds.), Trust and Trustworthy Computing. (pp. 116-130). Springer Berlin / Heidelberg.
Seager, W., Ruskov, M., Sasse, M.A., Fradinho, M. (2011). Eliciting and modelling expertise for serious games in project management. Entertainment Computing, 2 doi:10.1016/j.entcom.2011.01.002

2010

Beautement, A., Sasse, M.A. (2010). Gathering realistic authentication performance data through field trials.
Brostoff, S., Inglesant, P., Sasse, M.A. (2010). Evaluating the usability and security of a graphical one-time PIN system.
Fremont, G., Grazzini, S., Sasse, A., BEEHAREE, A. (2010). The SafeTRIP Project: Improving Road Safety for Passenger Vehicles using 2-way Satellite Communications.
Inglesant, P.G., Sasse, M.A. (2010). The true cost of unusable password policies: password use in the wild.
Inglesant, P., Sasse, M.A. (2010). Studying Password Use in the Wild: Practical Problems and Possible Solutions.
Jennett, C., Brostoff, S., Malheiros, M., Sasse, M.A. (2010). Investigating loan applicants' perceptions of alternative data items and the effect of incentives on disclosure.
Keval, H., Sasse, M.A. (2010). “ Not the Usual Suspects ” : A Study of Factors Reducing the Effectiveness of CCTV. Security Journal, 23 (2), 134-154.
Parkin, S., van Moorsel, A., Inglesant, P., Sasse, M.A. (2010). A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Rahaman, A., Sasse, M.A. (2010). A framework for the lived experience of identity. Identity in the Information Society, 3 (3), 605-638. doi:10.1007/s12394-010-0078-3
Rahaman, A., Sasse, M.A. (2010). Human-Centred Identity - From Rhetoric to Reality.
Riegelsberger, J., Sasse, M.A. (2010). Ignore These At Your Peril: Ten principles for trust design.
Ruskov, M., Seager, W., Sasse, M.A. (2010). Persuading Giants to be Wise:An Exploratory Study of Advice Sharing in Online Games.
Sasse, M.A. (2010). Not Seeing the Crime for the Cameras?. COMMUNICATIONS OF THE ACM, 53 (2), 22-25. doi:10.1145/1646353.1646363
Seager, W., Ruskov, M., Sasse, M.A., Fradinho, M. (2010). Eliciting and modelling expertise for serious game design.

2009

Beautement, A., Coles, R., Griffin, J., Ioannidis, C., Monahan, B., Pym, D., ...Wonham, M. (2009). Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security.
Beautement, A., Sasse, A. (2009). The economics of user effort in information security. Computer Fraud & Security, 2009 (10), 8-12. doi:10.1016/S1361-3723(09)70127-7
BEAUTEMENT, A., Sasse, M.A. (2009). The Compliance Budget: The economics of user effort in information security. Computer Fraud & Security, 2009 (10), 8-12. doi:10.1016/S1361-3723(09)70127-7
Chadwick, D., Inglesant, P., Shi, L.L., Sasse, M.A. (2009). Writing Security Policies in Natural Language. Public Service Review: Home Affairs, (17),
Flechais, I., Sasse, M.A. (2009). Stakeholder Involvement, Motivation, Responsibility, Communication: How to Design Usable Security in e-Science. International Journal of Human-Computer Studies, 67 (4), 281-296.
Knoche, H., Sasse, M.A. (2009). The Big Picture on Small Screens Delivering Acceptable Video Quality in Mobile TV. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 5 (3), 20:1-20:27. doi:10.1145/1556134.1556137
Laqua, S., Sasse, M.A. (2009). Exploring Blog Spaces: A Study of Blog Reading Experiences using Dynamic Contextual Displays.
Laqua, S., Sasse, M.A., Gates, C., Greenspan, S. (2009). Making Sense of the Unknown: Knowledge Dissemination in Organizations.
Sasse, M.A., Johnson, G.I., Briggs, P. (2009). Introducing word processing to novice users: A study of 'procedural' and 'conceptual' approaches. Contemporary Ergonomics 1984-2008: Selected Papers and an Overview of the Ergonomics Society Annual Conference, 146-151.
Sasse, M.A., Karat, C.-.M., Maxion, R.A. (2009). Designing and evaluating usable security and privacy technology..

2008

Beautement, A., Sasse, M.A., Wonham, M. (2008). The compliance budget: managing security behaviour in organisations.
Chadwick, D.W., Shil, L.L., Sasse, M.A., Inglesant, P. (2008). Interface intelligence.
Coles, R., Griffin, J., Johnson, H., Monahan, B., Parkin, S.E., Pym, D., ...van Moorsel, A. (2008). Trust Economics Feasibility Study.
Inglesant, P., Sasse, M.A., Chadwick, D., Shi, L.L. (2008). Expressions of Expertness: The Virtuous Circle of Natural Language for Access Control Policy Specification.
Keval, H., Sasse, M.A. (2008). To catch a thief - you need at least 8 frames per second: the impact of frame rates on user performance in a CCTV detection task..
Keval, H.U., Sasse, M.A. (2008). Can we ID from CCTV? Image quality in digital CCTV and face identification performance.
Knoche, H., Sasse, M.A. (2008). The sweet spot: How people trade off size and definition on mobile devices.
Knoche, H., Sasse, M.A. (2008). Getting the big picture on small screens: Quality of experience in mobile TV. In Ahmad, A.M.A., Ibrahim, I.K. (Eds.), Multimedia Transcoding in Mobile and Wireless Networks. (pp. 31-46). Hershey, PA, USA: IGI Global.
Oshlyansky, L., Cairns, P.A., Sasse, M.A., Harrison, C. (2008). The challenges faced by academia preparing students for industry: what we teach and what we do..
Sasse, M.A. (2008). Comment and analysis: Angela Sasse on the vulnerability of biometric security.

2007

Ball, L.J., Sasse, M.A., Sas, C., Ormerod, T.C., Dix, A., Bagnall, P., McEwan, T. (2007). Preface: "HCI... but not as we know it". People and Computers XXI HCI.But Not as We Know It - Proceedings of HCI 2007: The 21st British HCI Group Annual Conference, 1
Boccolini, G., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., Muster, D., ...Pala, G. (2007). UNIC: A novel bi-directional satellite-based platform to provide TV-centric triple play services.
Boccolini, G., Luise, M., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., ...Sasse, M.A. (2007). A two-way interactive broadband satellite architecture to break the digital divide barrier.
Boccolini, G., Luise, M., Garnier, B., Merour, J.-.M., Brunelle, A., Titomanlio, S., ...Sasse, M.A. (2007). TV-Centric Technologies To Provide Remote Areas With Two-Way Satellite Broadband Access.
Bonhard, P., Sasse, A., Harries, C. (2007). “The Devil You Know Knows Best” – How Online Recommendations Can Benefit From Social Networking.
Flechais, I., Mascolo, C., Sasse, M.A. (2007). Integrating security and usability into the requirements and design process. International Journal of Electronic Security and Digital Forensics, 1 (1), 12-26. doi:10.1504/IJESDF.2007.013589
Inglesant, P., Sasse, M.A. (2007). Usability is the best policy: public policy and the lived experience of transport systems in London.
Knoche, H., McCarthy, J., Sasse, M.A. (2007). How low can you go? The effect of low resolutions on shot types in mobile TV. Multimedia Tools and Applications, 145-166. doi:10.1007/s11042-006-0076-5
Knoche, H., Papaleo, M., Sasse, M.A., Vanelli-Coralli, A. (2007). The Kindest Cut: Enhancing the User Experience of Mobile TV through Adequate Zooming.
Laqua, S., Bandara, S.U., Sasse, M.A. (2007). GazeSpace: eye gaze controlled content spaces.
Laqua, S., Ogbechie, N., Sasse, M.A. (2007). Contextualizing the Blogosphere: A Comparison ofTraditional and Novel User Interfaces for the Web.
Riegelsberger, J., Sasse, A., McCarthy, J.D. (2007). Trust in Mediated Interactions. In Joinson, A., McKenna, K.Y.A.P., T, R., U, D. (Eds.), Oxford Handbook of Internet Psychology. (pp. 53-69). Oxford: Oxford University Press.
Sasse, M.A. (2007). Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A user experience of biometric airport systems. IEEE SECURITY & PRIVACY, 7 78-81.
Seager, W., Knoche, H., Sasse, M.A. (2007). TV-centricity - Requirements gathering for triple play services..

2006

Bonhard, P., Harries, C., McCarthy, J.D., Sasse, M.A. (2006). Accounting for Taste: Using Profile Similarity to Improve Recommender Systems.
Bonhard, P., Sasse, M.A. (2006). 'Knowing me, knowing you' - using profiles and social networking to improve recommender systems. BT Technology Journal, 24 (3), 84-98.
Chadwick, D., Sasse, M.A. (2006). The Virtuous Circle of Expressing Authorisation Policies.
Knoche, H., McCarthy, J.D., Sasse, M.A. (2006). A close-up on Mobile TV: The effect of low resolutions on shot types.
Knoche, H., Sasse, M.A. (2006). Breaking the news on mobile TV: user requirements of a popular mobile content..
Knoche, H., Sasse, M.A., McCarthy, J.D. (2006). Reading the Fine Print: The Effect of Text Legibility on Perceived Video Quality in Mobile TV.
Laqua, S., Patel, G., Sasse, M.A. (2006). Personalised Focus-Metaphor Interfaces: An Eye Tracking Study on User Confusion.
Sasse, M.A., Knoche, H. (2006). Quality in Context - an ecological approach to assessing QoS for mobile TV.

2005

Bonhard, P., Sasse, M.A. (2005). "I thought it was terrible and everyone else loved it" - A New Perspective for Effective Recommender System Design.
Brostoff, S., Sasse, M.A., Chadwick, D., Cunningham, J., Mbanaso, U., Otenko, S. (2005). "R-What?" Development of a Role-Based Access Control (RBAC) Policy-Writing Tool for e-Scientists. Software Practice and Experience, 35 (9), 835-856. doi:10.1002/spe.691
Flechais, I., Riegelsberger, J., Sasse, M.A. (2005). Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems.
Inglesant, P., Sasse, M.A. (2005). Situating the transient user: overcomingchallenges in the design of e-governmentsystems.
Inglesant, P., Sasse, M.A. (2005). Usability is a policy issue: Minimising the "Hassle Factor" in mobile payment of the Central London Congestion Charge.
Knoche, H., McCarthy, J.D., Sasse, M.A. (2005). Can small be beautiful?: assessing image resolution requirements for mobile TV.
McCarthy, J.D., Riegelsberger, J., Sasse, M.A. (2005). Commercial uses of eye tracking.
Riegelsberger, J., Sasse, A., McCarthy, J.D. (2005). Rich media, poor judgement? A study of media effects on users' trust in expertise.
Riegelsberger, J., Sasse, M.A., McCarthy, J. (2005). Depending on the Kindness of Strangers? Trust Relationships in Ambient Societies..
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2005). The Mechanics of Trust: A Framework for Research and Design. International Journal of Human-Computer Studies, 62 (3), 381-422. doi:10.1016/j.ijhcs.2005.01.001
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2005). Do people trust their eyes more than ears?: media bias in detecting cues of expertise.
Sasse, M.A. (2005). Usability and Trust in Information Systems. In Mansell, R., Collins, B. (Eds.), Trust and Crime in Information Societies. (pp. 319-348). Cheltenham, UK: Edward Elgar.
Sasse, M.A., Flechais, I. (2005). Usable Security: Why Do We Need It? How Do We Get It?. In Cranor, L.F., Garfinkel, S. (Eds.), Security and Usability: Designing secure systems that people can use. (pp. 13-30). Sebastopol, US: O'Reilly.
Scholl, J., Parnes, P., McCarthy, J.D., Sasse, M.A. (2005). Designing a large-scale video chat application.

2004

Boardman, R., Sasse, M.A. (2004). “Stuff Goes into the Computer and Doesn’t Come Out”: A Cross-tool Study of Personal Information Management.
Crisler, K., Turner, T., Aftelak, A., Visciola, M., Steinhage, A., Anneroth, M., ...Tscheligi, M. (2004). Considering the User in the Wireless World. IEEE Communications Magazine, 42 (9), 56-62. doi:10.1109/MCOM.2004.1336721
McCarthy, J.D., Sasse, M.A., Miras, D. (2004). Sharp or Smooth? Comparing the effects of quantization vs. frame rate for streamed video.
McCarthy, J.D., Sasse, M.A., Riegelsberger, J. (2004). The Geometry of Web Search.
Schulzrinne, H., Dimitrova, N., Sasse, M.A., Moon, S.B., Lienhart, R. (Eds.), (2004). Proceedings of the 12th ACM International Conference on Multimedia, New York, NY, USA, October 10-16, 2004. ACM.
Schulzrinne, H., Dimitrova, N., Sasse, M.A., Moon, S.B., Lienhart, R. (Eds.), (2004). MULTIMEDIA ’04: Proceedings of the 12th annual ACM international conference on Multimedia. New York, NY, USA: ACM.
Wilson, G.M., Sasse, M.A. (2004). From doing to being: getting closer to the user experience. Interacting with Computers, 16 (4), 697-705.

2003

Boardman, R., Spence, R., Sasse, M.A. (2003). Too many hierarchies? The daily struggle for control of the workspace.
Brostoff, S., Sasse, M.A. (2003). “Ten strikes and you're out”: Increasing the number of login attempts can improve password usability.
Flechais, I., Sasse, M.A., Hailes, S. (2003). Bringing Security Home: A Process for Developing Secure and Usable Systems.
Garau, M., Slater, M., Vinayagamoorthy, V., Brogni, A., Steed, A., Sasse, M.A. (2003). The impact of avatar realism and eye gaze control on perceived quality of communication in a shared immersive virtual environment..
McCarthy, J.D., Sasse, M.A., Riegelsberger, J. (2003). Could I have the Menu Please? An Eyetracking Study of Design Conventions.
Monthienvichienchai, R., Sasse, M.A. (2003). Learning from Others' Mistakes Through Computer Supported Vicarious Learning.
Riegelsberger, J., Sasse, M.A. (2003). Designing E-Commerce Applications for Consumer Trust. In Petrovic, O., Ksela, M., Fallenbock, M., Kittl, C. (Eds.), Trust in the Network Economy. (pp. 97-110). Wien, New York: Springer.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). Shiny Happy People Building Trust? Photos on e-commerce Websites and Consumer Trust.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). Trust at First Sight? A Test of Users' Ability to Identify Trustworthy e-commerce Sites.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2003). The Researcher's Dilemma: Evaluating Trust in Computer Mediated Communications. International Journal of Human-Computer Studies, 58 (6), 759-781. doi:10.1016/S1071-5819(03)00042-9
Sasse, M.A. (2003). Computer Security:Anatomy of a Usability Disaster, and a Plan for Recovery.

2002

Boardman, R., Sasse, M.A., Spence, R. (2002). Life Beyond the Mailbox: A Cross-Tool Perspective on Personal Information Management.
Bruneau, D., Sasse, M.A., McCarthy, J.D. (2002). The Eyes Never Lie: The Use of Eyetracking Data in HCI Research.
Crisler, K., Anneroth, M., Sasse, M.A., Pulli, P. (2002). A User-Focused ReferenceModel for WirelessSystems Beyond 3G. Eindhoven .
Monthivienchienchai, R., Sasse, M.A., Wheeldon, R. (2002). Educational Metadata: Friendly Fire?. In Hazemi, R., Hailes, S. (Eds.), Support for Authoring and Managing Web-based coursework:. (pp. 203-214). Springer.
Reigelberger, J., Sasse, M.A. (2002). Face It - Photos Don't Make a Web Site Trustworthy.
Riegelsberger, J., Sasse, M.A., McCarthy, J.D. (2002). Eye-catcher or blind spot?.
Sasse, M.A., Monthienivichienchai, R., Harris, C., Ismail, I., Wheeldon, R. (2002). The TACO Project. In Hazemi, R., Hailes, S. (Eds.), Support for Authoring and Managing Web-based coursework. (pp. 139-132). Springer.
Sasse, M.A., Monthienvichienchai, R. (2002). Computer Support for Vicarious Learning.
Sheeran, A., Sasse, M.A., Rimmer, J., Wakeman, I. (2002). How Web Browsers Shape User's Understanding of Networks. The Electronic Library, 20 (1), 35-42.
Terveen, L., Wixon, D., Comstoc, E., Sasse, M.A. (2002). Changing the World, Changing Ourselves.

2001

(2001). How web browsers shape users' understanding of networks.
(2001). Conducting audio and video quality assessment based on HCI evaluation principles. ERCIM News, 46 41-42.
Adams, A., Sasse, M.A. (2001). Privacy in multimedia communications: protecting users, not just data.
Bouch, A., Sasse, M.A. (2001). Not all bits have equal value: Investigating users' network QoS requirements.
Bouch, A., Sasse, M.A. (2001). Designing QoS and charging mechanisms: he who pays the service shapes the design.
Bouch, A., Sasse, M.A. (2001). Why value is everything: A user centred approach to network Quality of Service and pricing.
Bouch, A., Wilson, G., Sasse, M.A. (2001). A 3-dimensional approach to measuring end-user quality of service.
Brostoff, S., Sasse, M.A. (2001). Safe and sound: a safety-critical design approach to security.
Garau, M., Slater, M., Bee, S., Sasse, M.A. (2001). The impact of eye gaze on communication using humanoid avatars.
Monthienvichienchai, R., Sasse, M.A., Wheeldon, R. (2001). There's trouble in paradise: problems with educational metadata encountered during the MALTED project.
Monthienvichienchai, R., Sasse, M.A., Wheeldon, R. (2001). Educational metadata - friend or foe?.
Pitt, J.V., Sasse, M.A. (2001). Privacy in collaborative multimedia environments.
Riegelsberger, J., Sasse, M.A. (2001). Trustbuilders and trustbusters: the role of trust cues in interfaces to e-commerce applications.
Sasse, M.A., Brostoff, S., Weirich, D. (2001). Transforming the "weakest link": a human-computer interaction approach to usable and effective security. BT Technology Journal, 19 122-131.
Weirich, D., Sasse, M.A. (2001). Persuasive password security.
Weirich, D., Sasse, M.A. (2001). Pretty good persuasion: A first step towards effective password security for the real world.
Wilson, G., Sasse, M.A. (2001). Straight from the heart: using physiological measurements in the evaluation of multimedia quality.

2000

Bouch, A., Sasse, M.A. (2000). The case for predictable media quality in networked multimedia applications.
Bouch, A., Sasse, M.A., DeMeer, H. (2000). Of packets and people: A user-centered approach to quality of service.
Brostoff, S., Sasse, M.A. (2000). Are passfaces more usable than passwords? A field trail investigation.
Rielgelsberger, J., Sasse, M.A. (2000). Trust me, I'm a .com. InterMedia, 28 (4), 23-27.
Rimmer, J., Wakeman, I., Sheeran, L., Sasse, M.A. (2000). Messages from a tangled web.
Sheeran, L., Sasse, M.A., Rimmer, J., Wakeman, I. (2000). Back to basics: is a better understanding of the Internet a precursor for effective use of the web?.
Watson, A., Sasse, M.A. (2000). Distance education via IP videoconferencing: results from a national pilot project.
Watson, A., Sasse, M.A. (2000). The good, the bad and the muffled: the impact of different degradations on internet speech.
Wilson, G.M., Sasse, M.A. (2000). The head or the heart? Measuring the impact of media quality.
Wilson, G.M., Sasse, M.A. (2000). Listen to Your Heart Rate: Counting the Cost of Media Quality.. In Paivia, A. (Ed.), Affective Interactions - Towards a New Generation of Computer Interfaces. (pp. 9-20). Springer-Verlag.
Wilson, G.M., Sasse, M.A. (2000). Investigating the impact of audio degradations on users: subjective vs objective assessment methods.
Wilson, G., Sasse, M.A. (2000). Do users always know what's good for them?Utilising physiological responses to assess media quality.

1999

Adams, A., Sasse, M.A. (1999). Users are not the enemy. Communications of the ACM, 42 (12), 40-46.
Adams, A., Sasse, M.A. (1999). Taming the wolf in sheep's clothing: privacy in multimedia communications.
Adams, A., Sasse, M.A. (1999). Privacy issues in ubiquitous multimedia environments: wake sleeping dogs or let them lie?.
Bouch, A., Sasse, M.A. (1999). Network quality of service – an integrated perspective.
Bouch, A., Sasse, M.A. (1999). Network Quality of Service: what do users need?.
Bouch, A., Sasse, M.A. (1999). It ain't what you charge it's the way that you do it: a users' perspective of network Quality of Service and pricing.
Rimmer, J., Wakeman, I., Sheeran, L., Sasse, M.A. (1999). Examining users' repertoire of Internet applications.
Sasse, M.A., Johnson, C. (1999). Human-computer interaction INTERAGT '99 - IFIP TC.13 International Conference on Human-Computer Interaction, 30th August-3rd September 1999, Edinburgh, UK - Editors' preface: A perspective on failure.

1998

Hardman, V., Sasse, M.A., Kouvelas, I. (1998). Successful multiparty audio communication over the Internet. Communications of the ACM, 41 (5), 74-80. doi:10.1145/274946.274959
Hughes, J., Sasse, M.A. (1998). Design to Instruct: Lessons for Training ThroughInvolving Teachers in Design..
Sasse, M.A., Clark, L., Perkins, C. (1998). Piloting IP multicast conferencing over SuperJANET: the PIPVIC Project.
Sasse, M.A., Harris, C., Ismail, I., Monthienvichienchai, P. (1998). Support for authoring and managing web-based coursework: the TACO Project. In Hazemi, R., Hailes, S., Wilbur, S. (Eds.), The Digital University: Reinventing the Academy. (pp. 155-175). Berlin: Springer-Verlag.
Watson, A., Sasse, M.A. (1998). Measuring perceived quality of speech and video in multimedia conferencing applications.

1997

Adams, A., Sasse, M.A., Lunt, P. (1997). Making Passwords Secure and Usable.
Clark, L., Sasse, M.A. (1997). Conceptual Design Reconsidered: The Case of the Internet Session Directory Tool.
Hughes, J., Sasse, M.A. (1997). Internet Multimedia Conferencing - Results from the ReLaTe Project.
Kirstein, P.T., Bennett, R. (1997). Recent Activities in the MERCI Conferencing Project.
Perkins, C., Hardman, V., Kouvelas, I., Sasse, M.A. (1997). Multicast Audio: The Next Generation.
Watson, A., Sasse, M.A. (1997). Multimedia Conferencing via Multicast: Determining the Quality of Service Required by the End User.

1996

Sasse, M.A., Cunningham, J., Winder, R.L. (Eds.), (1996). People and Computers XI, Proceedings of HCI ’96. Springer.
Watson, A., Sasse, A. (1996). Assessing the usability and effectiveness of a remote language teaching system.
Watson, A., Sasse, M.A. (1996). Evaluating audio and video quality in low-cost multimedia conferencing systems. INTERACTING WITH COMPUTERS, 8 (3), 255-275. doi:10.1016/0953-5438(96)01032-6

1995

Hardman, V., Sasse, M.A., Handley, M., Watson, A. (1995). Reliable audio for use over the Internet.
Kirstein, P., Handley, M., Sasse, A., Clayman, S. (1995). Recent activities in the MICE conferencing project.

1994

Bilting, U., Sasse, M.A., Schulz, C.-.D., Turletti, T. (1994). International Research Seminars through Multimedia Conferencing: Experiences from the MICE project..
Handley, M.J., Kirstein, P.T., Angela Sasse, M. (1994). Multimedia integrated conferencing for European researchers: experiences form the MICE project. IEE Colloquium (Digest), (59),
Sasse, M.A., Bilting, U., Schulz, C.D., Turletti, T. (1994). Remote Seminars through Multimedia Conferencing:Experiences from the MICE project.
SASSE, M.A., HANDLEY, M.J., ISMAIL, N.M. (1994). Coping with Complexity and Interference - Design Issues in Multimedia Conferencing Systems.

1993

Handley, M., Kirstein, P.T., Sasse, M.A. (1993). Multimedia Integrated Conferencing for European Researchers (MICE): Piloting Activities and the Conference Management and Multiplexing Centre..
Sasse, M.A., Handley, M.J., Chuang, S.C. (1993). Support for Collaborative Authoring via Email - The MESSIE Environment.

1991

Sasse, M.A. (1991). How to t(r)ap user's mental models..

This page was last modified on 17 Jan 2017.

Professor
M. Angela Sasse

Photo of Angela Sasse

Office:
6.22, Malet Place Engineering

Tel:

+44 020 7679 7212

Fax:

+44 020 7387 1397

Email:

a.sasse [at] cs.ucl.ac.uk