Follow
Maritza Johnson
Title
Cited by
Cited by
Year
A study of privacy settings errors in an online social network
M Madejski, M Johnson, SM Bellovin
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
490*2012
Toward trustworthy AI development: mechanisms for supporting verifiable claims
M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ...
arXiv preprint arXiv:2004.07213, 2020
3462020
Facebook and privacy: it's complicated
M Johnson, S Egelman, SM Bellovin
Proceedings of the Eighth Symposium on Usable Privacy and Security, 9, 2012
3092012
“What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the US
N Malkin, J Bernd, M Johnson, S Egelman
Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC), 2018
612018
Laissez-faire file sharing: Access control designed for individuals at the endpoints
ML Johnson, SM Bellovin, RW Reeder, SE Schechter
Proceedings of the 2009 workshop on New security paradigms workshop, 1-10, 2009
532009
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources
C Thompson, M Johnson, S Egelman, D Wagner, J King
Proceedings of the Ninth Symposium on Usable Privacy and Security, 2013
50*2013
Optimizing a policy authoring framework for security and privacy policies
M Johnson, J Karat, CM Karat, K Grueneberg
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-9, 2010
472010
Usable policy template authoring for iterative policy refinement
M Johnson, J Karat, CM Karat, K Grueneberg
IEEE International Symposium on Policies for Distributed Systems and …, 2010
432010
The failure of online social network privacy settings. Department of Computer Science
M Madejski, M Johnson, SM Bellovin
Columbia University, Technical Report CUCS-010-11, 2011
232011
A design for using physiological signals to affect team game play
ZO Toups, R Graeber, A Kerne, L Tassinary, S Berry, K Overby, ...
Foundations of Augmented Cognition, 134-139, 2006
192006
Toward trustworthy AI development: mechanisms for supporting verifiable claims (2020)
M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ...
arXiv preprint arXiv:2004.07213, 2020
172020
Toward Usable Access Control for End-users: A case study of Facebook privacy settings
ML Johnson
Columbia University, 2012
172012
Security user studies and standards: Creating best practices
ML Johnson, ME Zurko
Proc. of ACM CHI’2007 Workshop on Security User Studies (San Jose, 2007
152007
Computer security research with human subjects: risks, benefits and informed consent
ML Johnson, SM Bellovin, AD Keromytis
Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR …, 2012
112012
Simple-vpn: Simple ipsec configuration
S Srivatsan, ML Johnson, SM Bellovin
102010
Taking data exposure into account: how does it affect the choice of sign-in accounts?
S Ronen, O Riva, M Johnson, D Thompson
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
72013
Smart Home Bystanders: Further Complexifying a Complex Context
J Bernd, A Frik, M Johnson, N Malkin
62019
Source prefix filtering in ROFL
H Zhao, ML Johnson, CK Chau, SM Bellovin
62009
Cybersecurity through an identity management system
E Androulaki, BD Vo, SM Bellovin
52009
Teaching cybersecurity: Introducing the security mindset
J Bernd, D Garcia, B Holley, M Johnson
Proceedings of the 53rd ACM Technical Symposium on Computer Science …, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20