Publications
Found 93 results
[ Author
Filters: First Letter Of Last Name is E [Clear All Filters]
(2014).
(2013).
(2013).
(2013).
There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media.
27-32.
(2012).
(2012).
(2013).
(2013).
(2013). Competitive analysis of financial games.
Proceedings 33rd Annual Symposium on Foundations of Computer Science. 327-333.
(1992). The mortgage problem.
Proceedings of the Second Israel Symposium on Theory and Computing Systems . 304-312.
(1993).
(1992).
(1997).
(2006).
(1990). Predicting Privacy and Security Attitudes.
Computers and Society: The Newsletter of ACM SIGCAS. 45(1), 22-28.
(2015). The Teaching Privacy Curriculum.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE ’16), Memphis, TN. 591-596.
(2016). The Myth of the Average User: Improving Privacy and Security Systems through Individualization.
Proceedings of the 2015 New Security Paradigms Workshop (NSPW ’15).
(2015).
(2015).
(2014). Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
(2016). Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms.
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
(2015). Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
(2015). The Usable Security & Privacy Group.
30 Years of Innovation: ICSI 30th Anniversary Celebration.
(2018).
(1987).