Follow
Ingolf Becker
Ingolf Becker
Verified email at cs.ucl.ac.uk - Homepage
Title
Cited by
Cited by
Year
Productive security: A scalable methodology for analysing employee security behaviours
A Beautement, I Becker, S Parkin, K Krol, A Sasse
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 253-270, 2016
802016
Finding Security Champions in Blends of Organisational Culture
I Becker, S Parkin, MA Sasse
EuroUSEC '17, 2017
522017
Dataset: Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption
A Demjaha, J Spring, IF Becker, S Parkin, MA Sasse
UCL Jill Dando Institute of Security and Crime Science, 2018
38*2018
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption
A Demjaha, J Spring, IF Becker, S Parkin, MA Sasse
Workshop on Usable Security (USEC 2018), 2018
382018
From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design
MAS Steve Dodier-Lazaro, Ruba Abu-Salma, Ingolf Becker
CHI 2017 Workshop on Values in Computing, 7, 2017
372017
Interventions for long‐term software security: Creating a lightweight program of assurance techniques for developers
C Weir, I Becker, J Noble, L Blair, MA Sasse, A Rashid
Software: Practice and Experience 50 (3), 275-298, 2020
332020
A passion for security: Intervening to help software developers
C Weir, I Becker, L Blair
2021 IEEE/ACM 43rd International Conference on Software Engineering …, 2021
312021
Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection
S Zheng, I Becker
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 253-271, 2022
282022
A socio-technical and co-evolutionary framework for reducing human-related risks in cyber security and cybercrime ecosystems
T Islam, I Becker, R Posner, P Ekblom, M McGuire, H Borrion, S Li
International Conference on Dependability in Sensor, Cloud, and Big Data …, 2019
252019
International comparison of bank fraud reimbursement: customer perceptions and contractual terms
I Becker, A Hutchings, R Abu-Salma, R Anderson, N Bohm, SJ Murdoch, ...
Journal of Cybersecurity 3 (2), 109-125, 2017
242017
Interventions for software security: creating a lightweight program of assurance techniques for developers
C Weir, I Becker, J Noble, L Blair, A Sasse, A Rashid
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
212019
Applying cognitive control modes to identify security fatigue hotspots
S Parkin, K Krol, I Becker, MA Sasse
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
212016
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength
I Becker, S Parkin, MA Sasse
27th USENIX Security Symposium (USENIX Security 18), 2018
202018
Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations
I Becker, S Parkin, MA Sasse
Learning from Authoritative Security Experiment Results (LASER), 2016
162016
Checking, nudging or scoring? Evaluating e-mail user security tools
SY Zheng, I Becker
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 57-76, 2023
142023
Light-touch interventions to improve software development security
C Weir, L Blair, I Becker, A Sasse, J Noble
2018 IEEE Cybersecurity Development (SecDev), 85-93, 2018
142018
Incorporating software security: using developer workshops to engage product managers
C Weir, I Becker, L Blair
Empirical Software Engineering 28 (2), 21, 2023
102023
“It may be a pain in the backside but...” Insights into the resilience of business after GDPR
G Buckley, T Caulfield, I Becker
Proceedings of the 2022 New Security Paradigms Workshop, 21-34, 2022
102022
Are payment card contracts unfair?
SJ Murdoch, I Becker, R Abu-Salma, R Anderson, N Bohm, A Hutchings, ...
Financial Crypto, 2016
8*2016
In Control with no Control: Perceptions and Reality of Windows 10 Home Edition Update Features
J Morris, I Becker, S Parkin
Workshop on Usable Security (USEC), 2019
72019
The system can't perform the operation now. Try again later.
Articles 1–20