Productive security: A scalable methodology for analysing employee security behaviours A Beautement, I Becker, S Parkin, K Krol, A Sasse Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 253-270, 2016 | 80 | 2016 |
Finding Security Champions in Blends of Organisational Culture I Becker, S Parkin, MA Sasse EuroUSEC '17, 2017 | 52 | 2017 |
Dataset: Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption A Demjaha, J Spring, IF Becker, S Parkin, MA Sasse UCL Jill Dando Institute of Security and Crime Science, 2018 | 38* | 2018 |
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption A Demjaha, J Spring, IF Becker, S Parkin, MA Sasse Workshop on Usable Security (USEC 2018), 2018 | 38 | 2018 |
From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design MAS Steve Dodier-Lazaro, Ruba Abu-Salma, Ingolf Becker CHI 2017 Workshop on Values in Computing, 7, 2017 | 37 | 2017 |
Interventions for long‐term software security: Creating a lightweight program of assurance techniques for developers C Weir, I Becker, J Noble, L Blair, MA Sasse, A Rashid Software: Practice and Experience 50 (3), 275-298, 2020 | 33 | 2020 |
A passion for security: Intervening to help software developers C Weir, I Becker, L Blair 2021 IEEE/ACM 43rd International Conference on Software Engineering …, 2021 | 31 | 2021 |
Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection S Zheng, I Becker Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 253-271, 2022 | 28 | 2022 |
A socio-technical and co-evolutionary framework for reducing human-related risks in cyber security and cybercrime ecosystems T Islam, I Becker, R Posner, P Ekblom, M McGuire, H Borrion, S Li International Conference on Dependability in Sensor, Cloud, and Big Data …, 2019 | 25 | 2019 |
International comparison of bank fraud reimbursement: customer perceptions and contractual terms I Becker, A Hutchings, R Abu-Salma, R Anderson, N Bohm, SJ Murdoch, ... Journal of Cybersecurity 3 (2), 109-125, 2017 | 24 | 2017 |
Interventions for software security: creating a lightweight program of assurance techniques for developers C Weir, I Becker, J Noble, L Blair, A Sasse, A Rashid 2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019 | 21 | 2019 |
Applying cognitive control modes to identify security fatigue hotspots S Parkin, K Krol, I Becker, MA Sasse Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016 | 21 | 2016 |
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength I Becker, S Parkin, MA Sasse 27th USENIX Security Symposium (USENIX Security 18), 2018 | 20 | 2018 |
Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations I Becker, S Parkin, MA Sasse Learning from Authoritative Security Experiment Results (LASER), 2016 | 16 | 2016 |
Checking, nudging or scoring? Evaluating e-mail user security tools SY Zheng, I Becker Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 57-76, 2023 | 14 | 2023 |
Light-touch interventions to improve software development security C Weir, L Blair, I Becker, A Sasse, J Noble 2018 IEEE Cybersecurity Development (SecDev), 85-93, 2018 | 14 | 2018 |
Incorporating software security: using developer workshops to engage product managers C Weir, I Becker, L Blair Empirical Software Engineering 28 (2), 21, 2023 | 10 | 2023 |
“It may be a pain in the backside but...” Insights into the resilience of business after GDPR G Buckley, T Caulfield, I Becker Proceedings of the 2022 New Security Paradigms Workshop, 21-34, 2022 | 10 | 2022 |
Are payment card contracts unfair? SJ Murdoch, I Becker, R Abu-Salma, R Anderson, N Bohm, A Hutchings, ... Financial Crypto, 2016 | 8* | 2016 |
In Control with no Control: Perceptions and Reality of Windows 10 Home Edition Update Features J Morris, I Becker, S Parkin Workshop on Usable Security (USEC), 2019 | 7 | 2019 |