Maritza Johnson
Title
Cited by
Cited by
Year
A study of privacy settings errors in an online social network
M Madejski, M Johnson, SM Bellovin
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
411*2012
Facebook and privacy: it's complicated
M Johnson, S Egelman, SM Bellovin
Proceedings of the Eighth Symposium on Usable Privacy and Security, 9, 2012
2512012
Laissez-faire file sharing: Access control designed for individuals at the endpoints
ML Johnson, SM Bellovin, RW Reeder, SE Schechter
Proceedings of the 2009 workshop on New security paradigms workshop, 1-10, 2009
452009
Toward trustworthy AI development: mechanisms for supporting verifiable claims
M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ...
arXiv preprint arXiv:2004.07213, 2020
422020
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources
C Thompson, M Johnson, S Egelman, D Wagner, J King
Proceedings of the Ninth Symposium on Usable Privacy and Security, 2013
41*2013
Optimizing a policy authoring framework for security and privacy policies
M Johnson, J Karat, CM Karat, K Grueneberg
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-9, 2010
392010
Usable policy template authoring for iterative policy refinement
M Johnson, J Karat, CM Karat, K Grueneberg
IEEE International Symposium on Policies for Distributed Systems and …, 2010
362010
“What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the US
N Malkin, J Bernd, M Johnson, S Egelman
Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC), 2018
23*2018
A design for using physiological signals to affect team game play
ZO Toups, R Graeber, A Kerne, L Tassinary, S Berry, K Overby, ...
Foundations of Augmented Cognition, 134-139, 2006
182006
Security user studies and standards: Creating best practices
ML Johnson, ME Zurko
Proc. of ACM CHI’2007 Workshop on Security User Studies (San Jose, 2007
142007
Toward Usable Access Control for End-users: A case study of Facebook privacy settings
ML Johnson
Columbia University, 2012
122012
Simple-vpn: Simple ipsec configuration
S Srivatsan, ML Johnson, SM Bellovin
92010
Computer security research with human subjects: risks, benefits and informed consent
ML Johnson, SM Bellovin, AD Keromytis
International Conference on Financial Cryptography and Data Security, 131-137, 2011
82011
Taking data exposure into account: how does it affect the choice of sign-in accounts?
S Ronen, O Riva, M Johnson, D Thompson
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
62013
Source prefix filtering in ROFL
H Zhao, ML Johnson, CK Chau, SM Bellovin
62009
Cybersecurity through an identity management system
E Androulaki, BD Vo, SM Bellovin
42009
Rust: A retargetable usability testbed for website authentication technologies
ML Johnson, C Atreya, A Aviv, MP Raykova, SM Bellovin, GE Kaiser
22008
Teaching Cybersecurity in CSP (or Any CS Class) Introducing the Security Mindset
D Garcia, B Holley, J Bernd, M Johnson
Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020
2020
Smart Home Bystanders: Further Complexifying a Complex Context
J Bernd, A Frik, M Johnson, N Malkin
2019
Security Assurance for Web Device APIs
ML Johnson, SM Bellovin
2008
The system can't perform the operation now. Try again later.
Articles 1–20