Остановите войну!
for scientists:
default search action
Robert W. Proctor
- > Home > Persons > Robert W. Proctor
Publications
- 2022
- [j44]Jing Chen, Huangyi Ge, Ninghui Li, Robert W. Proctor:
What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors. Hum. Factors 64(8): 1331-1350 (2022) - [i1]Aiping Xiong, Chuhao Wu, Tianhao Wang, Robert W. Proctor, Jeremiah Blocki, Ninghui Li, Somesh Jha:
Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision. CoRR abs/2202.10014 (2022) - 2019
- [j38]Aiping Xiong, Robert W. Proctor, Weining Yang, Ninghui Li:
Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages. Hum. Factors 61(4) (2019) - [j36]Scott R. Moore, Huangyi Ge, Ninghui Li, Robert W. Proctor:
Cybersecurity for Android Applications: Permissions in Android 5 and 6. Int. J. Hum. Comput. Interact. 35(7): 630-640 (2019) - 2018
- [j35]Isis Chong, Huangyi Ge, Ninghui Li, Robert W. Proctor:
Influence of privacy priming and security framing on mobile app selection. Comput. Secur. 78: 143-154 (2018) - [j34]Jing Chen, Scott Mishler, Bin Hu, Ninghui Li, Robert W. Proctor:
The description-experience gap in the effect of warning reliability on user trust and performance in a phishing-detection context. Int. J. Hum. Comput. Stud. 119: 35-47 (2018) - 2017
- [j32]Aiping Xiong, Robert W. Proctor, Weining Yang, Ninghui Li:
Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages? Hum. Factors 59(4): 640-660 (2017) - [c21]Weining Yang, Aiping Xiong, Jing Chen, Robert W. Proctor, Ninghui Li:
Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment. HotSoS 2017: 52-61 - 2016
- [c20]Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor:
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies. CCS 2016: 1216-1229 - 2015
- [c18]Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu:
Dimensions of Risk in Mobile Applications: A User Study. CODASPY 2015: 49-60 - [c17]Weining Yang, Jing Chen, Aiping Xiong, Robert W. Proctor, Ninghui Li:
Effectiveness of a phishing warning in field settings. HotSoS 2015: 14:1-14:2 - [c16]Haining Chen, Omar Chowdhury, Jing Chen, Ninghui Li, Robert W. Proctor:
Towards quantification of firewall policy complexity. HotSoS 2015: 18:1-18:2 - 2014
- [j27]Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor:
Effective Risk Communication for Android Apps. IEEE Trans. Dependable Secur. Comput. 11(3): 252-265 (2014) - 2012
- [c14]Christopher S. Gates, Ninghui Li, Jing Chen, Robert W. Proctor:
CodeShield: towards personalized application whitelisting. ACSAC 2012: 279-288
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-24 02:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint