Follow
Jacob Abbott
Jacob Abbott
Postdoctoral Fellow, Indiana University
Verified email at indiana.edu - Homepage
Title
Cited by
Cited by
Year
How Mandatory Second Factor Affects the Authentication User Experience
J Abbott, S Patil
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
472020
Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI
J Abbott, H MacLeod, N Nurain, G Ekobe, S Patil
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
342019
User-Centered Risk Communication for Safer Browsing
S Das, J Abbott, S Gopavaram, J Blythe, LJ Camp
Proceedings of the First Asia USEC-Workshop on Usable Security, In …, 2020
222020
The importance of social identity on password formulations
M Grobler, MAP Chamikara, J Abbott, JJ Jeong, S Nepal, C Paris
Personal and Ubiquitous Computing 25 (5), 813-827, 2021
162021
CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication
LJ Camp, J Abbott, S Chen
2016 49th Hawaii International Conference on System Sciences (HICSS), 3656-3665, 2016
142016
Factors Influencing Password Reuse: A Case Study
J Abbott, D Calarco, LJ Camp
TPRC, 2018
122018
Password differences based on language and testing of memory recall
J Abbott, VM Garcia
NNGT Int. J. Inf. Secur. 2, 1-6, 2015
102015
Creen: a carbon footprint calculator designed for calculation in context
J Abbott, G Gao, P Shih
International Conference on Information, 769-776, 2019
72019
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions
AC Tally, J Abbott, A Bochner, S Das, C Nippert-Eng
Proceedings of the ACM on Human-Computer Interaction 7 (CSCW1), 1-27, 2023
42023
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home
J Abbott, J Dev, D Kim, S Gopavaram, M Iyer, S Sadam, S Mare, ...
Proceedings of the 2022 European Symposium on Usable Security, 98-110, 2022
42022
Identifying an aurally distinct phrase set for text entry techniques
J Abbott, J Kaye, J Clawson
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
32022
Small Data Privacy Protection: An Exploration of the Utility of Anonymized Data of People with Rare Diseases
H MacLeod, J Abbott, S Patil
roceedings of the 2017 Workshop on Interactive Systems in Healthcare (WISH’17), 2017
32017
Building An Authentication Infrastructure—Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement
Z Zhang, J Abbott, LJ Camp
Available at SSRN 4177411, 2022
22022
Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees’ Current Practices
AC Tally, J Abbott, AM Bochner, S Das, C Nippert-Eng
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023
12023
Kids, Cats, and Control: Designing Privacy and Security Dashboards for IoT Home Devices
J Abbott, J Dev, DI Kim, SR Gopavaram, M Iyer, S Sadam, S Mare, ...
Symposium on Usable Security and Privacy (USEC) 2023, 2023
12023
Potential Reuse of University Credentials
A Bochner, J Abbott, LJ Camp
Poster at the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–16