Maritza Johnson
Cited by
Cited by
A study of privacy settings errors in an online social network
M Madejski, M Johnson, SM Bellovin
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
Facebook and privacy: it's complicated
M Johnson, S Egelman, SM Bellovin
Proceedings of the Eighth Symposium on Usable Privacy and Security, 9, 2012
Toward trustworthy AI development: mechanisms for supporting verifiable claims
M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ...
arXiv preprint arXiv:2004.07213, 2020
“What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the US
N Malkin, J Bernd, M Johnson, S Egelman
Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC), 2018
Laissez-faire file sharing: Access control designed for individuals at the endpoints
ML Johnson, SM Bellovin, RW Reeder, SE Schechter
Proceedings of the 2009 workshop on New security paradigms workshop, 1-10, 2009
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources
C Thompson, M Johnson, S Egelman, D Wagner, J King
Proceedings of the Ninth Symposium on Usable Privacy and Security, 2013
Optimizing a policy authoring framework for security and privacy policies
M Johnson, J Karat, CM Karat, K Grueneberg
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-9, 2010
Usable policy template authoring for iterative policy refinement
M Johnson, J Karat, CM Karat, K Grueneberg
IEEE International Symposium on Policies for Distributed Systems and …, 2010
The failure of online social network privacy settings. Department of Computer Science
M Madejski, M Johnson, SM Bellovin
Columbia University, Technical Report CUCS-010-11, 2011
A design for using physiological signals to affect team game play
ZO Toups, R Graeber, A Kerne, L Tassinary, S Berry, K Overby, ...
Foundations of Augmented Cognition, 134-139, 2006
Toward Usable Access Control for End-users: A case study of Facebook privacy settings
ML Johnson
Columbia University, 2012
Security user studies and standards: Creating best practices
ML Johnson, ME Zurko
Proc. of ACM CHI’2007 Workshop on Security User Studies (San Jose, 2007
Computer security research with human subjects: risks, benefits and informed consent
ML Johnson, SM Bellovin, AD Keromytis
International Conference on Financial Cryptography and Data Security, 131-137, 2011
Simple-vpn: Simple ipsec configuration
S Srivatsan, ML Johnson, SM Bellovin
Taking data exposure into account: how does it affect the choice of sign-in accounts?
S Ronen, O Riva, M Johnson, D Thompson
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
Source prefix filtering in ROFL
H Zhao, ML Johnson, CK Chau, SM Bellovin
Cybersecurity through an identity management system
E Androulaki, BD Vo, SM Bellovin
Smart Home Bystanders: Further Complexifying a Complex Context
J Bernd, A Frik, M Johnson, N Malkin
Rust: A retargetable usability testbed for website authentication technologies
ML Johnson, C Atreya, A Aviv, MP Raykova, SM Bellovin, GE Kaiser
Teaching Cybersecurity: Introducing the Security Mindset
J Bernd, D Garcia, B Holley, M Johnson
Proceedings of the 53rd ACM Technical Symposium on Computer Science …, 2022
The system can't perform the operation now. Try again later.
Articles 1–20