default search action
Sonia Chiasson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Srivathsan G. Morkonda, Sonia Chiasson, Paul C. van Oorschot:
Influences of displaying permission-related information on web single sign-on login decisions. Comput. Secur. 139: 103666 (2024) - 2023
- [c78]Kazma Chaudhry, Anna-Lena Theus, Hala Assal, Sonia Chiasson:
"It's not that I want to see the student's bedroom...": Instructor Perceptions of e-Proctoring Software. EuroUSEC 2023: 15-26 - [c77]Khadija Baig, Daniela Napoli, Sonia Chiasson:
A comparison of users' and non-users' perceptions of health and ancestry at-home DNA testing. EuroUSEC 2023: 48-67 - [c76]Anna-Lena Theus, Sonia Chiasson:
"A Solution to a Problem that Didn't Exist?": Exploring Attitudes Towards Smart Streetlight Systems. INTERACT (3) 2023: 205-238 - [c75]Paulina Chametka, Sana Maqsood, Sonia Chiasson:
Security and Privacy Perceptions of Mental Health Chatbots. PST 2023: 1-7 - [i5]Srivathsan G. Morkonda, Sonia Chiasson, Paul C. van Oorschot:
Influences of Displaying Permission-related Information on Web Single Sign-On Login Decisions. CoRR abs/2308.13074 (2023) - 2022
- [j18]Matthew Hull, Leah Zhang-Kennedy, Khadija Baig, Sonia Chiasson:
Understanding individual differences: factors affecting secure computer behaviour. Behav. Inf. Technol. 41(15): 3237-3263 (2022) - [j17]Leah Zhang-Kennedy, Sonia Chiasson:
A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education. ACM Comput. Surv. 54(1): 12:1-12:39 (2022) - [j16]Jessica N. Rocheleau, Sonia Chiasson:
Privacy and Safety on Social Networking Sites: Autistic and Non-Autistic Teenagers' Attitudes and Behaviors. ACM Trans. Comput. Hum. Interact. 29(1): 1:1-1:39 (2022) - [c74]Fiona Westin, Kalpana Hundlani, Sonia Chiasson:
"I just want to play games with friends and it asked me for all of my information": Trading privacy for connection during the COVID-19 pandemic. EuroUSEC 2022: 40-52 - [c73]Michael Shlega, Sana Maqsood, Sonia Chiasson:
Users, Smart Homes, and Digital Assistants: Impact of Technology Experience and Adoption. HCI (32) 2022: 422-443 - [c72]Maxwell Keleher, Fiona Westin, Preethi Nagabandi, Sonia Chiasson:
How Well Do Experts Understand End-Users' Perceptions of Manipulative Patterns? NordiCHI 2022: 52:1-52:21 - [e3]Sonia Chiasson, Apu Kapadia:
Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022. USENIX Association 2022 [contents] - [i4]Srivathsan G. Morkonda, Sonia Chiasson, Paul C. van Oorschot:
SSOPrivateEye: Timely Disclosure of Single Sign-On Privacy Design Differences. CoRR abs/2209.04490 (2022) - 2021
- [j15]Sana Maqsood, Sonia Chiasson:
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens. ACM Trans. Priv. Secur. 24(4): 28:1-28:37 (2021) - [c71]Michael Lutaaya, Khadija Baig, Sana Maqsood, Sonia Chiasson:
"I'm Not a Millionaire": How Users' Online Behaviours and Offline Behaviours Impact Their Privacy. CHI Extended Abstracts 2021: 373:1-373:7 - [c70]Fiona Westin, Sonia Chiasson:
"It's So Difficult to Sever that Connection": The Role of FoMO in Users' Reluctant Privacy Behaviours. CHI 2021: 550:1-550:15 - [c69]Sana Maqsood, Sonia Chiasson:
"They think it's totally fine to talk to somebody on the internet they don't know": Teachers' perceptions and mitigation strategies of tweens' online risks. CHI 2021: 688:1-688:17 - [c68]Khadija Baig, Elisa Kazan, Kalpana Hundlani, Sana Maqsood, Sonia Chiasson:
Replication: Effects of Media on the Mental Models of Technical Users. SOUPS @ USENIX Security Symposium 2021: 119-138 - [c67]Leah Zhang-Kennedy, Sonia Chiasson:
"Whether it's moral is a whole other story": Consumer perspectives on privacy regulations and corporate data practices. SOUPS @ USENIX Security Symposium 2021: 197-216 - [c66]Daniela Napoli, Khadija Baig, Sana Maqsood, Sonia Chiasson:
"I'm Literally Just Hoping This Will Work: " Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities. SOUPS @ USENIX Security Symposium 2021: 263-280 - [c65]Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Capkun:
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols. USENIX Security Symposium 2021: 3811-3828 - [c64]Srivathsan G. Morkonda, Sonia Chiasson, Paul C. van Oorschot:
Empirical Analysis and Privacy Implications in OAuth-based Single Sign-On Systems. WPES@CCS 2021: 195-208 - [e2]Sonia Chiasson:
Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021. USENIX Association 2021 [contents] - [i3]Srivathsan G. Morkonda, Paul C. van Oorschot, Sonia Chiasson:
Exploring Privacy Implications in OAuth Deployments. CoRR abs/2103.02579 (2021) - 2020
- [c63]Khadija Baig, Reham Mohamed, Anna-Lena Theus, Sonia Chiasson:
"I'm hoping they're an ethical company that won't do anything that I'll regret": Users Perceptions of At-home DNA Testing Companies. CHI 2020: 1-13 - [c62]Sandra Gabriele, Sonia Chiasson:
Understanding Fitness Tracker Users' Security and Privacy Knowledge, Attitudes and Behaviours. CHI 2020: 1-12 - [c61]Rebecca Jeong, Sonia Chiasson:
'Lime', 'Open Lock', and 'Blocked': Children's Perception of Colors, Symbols, and Words in Cybersecurity Warnings. CHI 2020: 1-13 - [c60]Reham Mohamed, Paulina Chametka, Sonia Chiasson:
The Influence of Decaying the Representation of Older Social Media Content on Simulated Hiring Decisions. CHI 2020: 1-19 - [e1]Heather Richter Lipford, Sonia Chiasson:
Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020. USENIX Association 2020 [contents] - [i2]Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Capkun:
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols. IACR Cryptol. ePrint Arch. 2020: 1298 (2020)
2010 – 2019
- 2019
- [c59]Hala Assal, Sonia Chiasson:
'Think secure from the beginning': A Survey with Software Developers. CHI 2019: 289 - [c58]Eric Spero, Milica Stojmenovic, Sonia Chiasson, Robert Biddle:
Control and Understanding in Malware and Legitimate Software. eCrime 2019: 1-11 - [c57]Fiona Westin, Sonia Chiasson:
Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm. NSPW 2019: 57-67 - [c56]Yomna Abdelaziz, Daniela Napoli, Sonia Chiasson:
End-Users and Service Providers: Trust and Distributed Responsibility for Account Security. PST 2019: 1-6 - [c55]Eric Spero, Milica Stojmenovic, Zahra Hassanzadeh, Sonia Chiasson, Robert Biddle:
Mixed Pictures: Mental Models of Malware. PST 2019: 1-3 - 2018
- [j14]Hala Assal, Ahsan Imran, Sonia Chiasson:
An exploration of graphical password authentication for children. Int. J. Child Comput. Interact. 18: 37-46 (2018) - [j13]Sonia Chiasson, Yomna Abdelaziz, Farah Chanchary:
Privacy Concerns Amidst OBA and the Need for Alternative Models. IEEE Internet Comput. 22(2): 52-61 (2018) - [j12]Fanny Lalonde Lévesque, Sonia Chiasson, Anil Somayaji, José M. Fernandez:
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach. ACM Trans. Priv. Secur. 21(4): 18:1-18:30 (2018) - [c54]Sana Maqsood, Christine Mekhail, Sonia Chiasson:
A day in the life of jos: a web-based game to increase children's digital literacy. IDC 2018: 241-252 - [c53]Sumbal Maqsood, Robert Biddle, Sana Maqsood, Sonia Chiasson:
An exploratory study of children's online password behaviours. IDC 2018: 539-544 - [c52]Daniela Napoli, Sonia Chiasson:
Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers. CCS 2018: 2252-2254 - [c51]Daniela Napoli, Sonia Chiasson:
Exploring the Impact of Colour-Blindness on Computer Game Performance. CHI Extended Abstracts 2018 - [c50]Reham Ebada Mohamed, Sonia Chiasson:
Online Privacy and Aging of Digital Artifacts. SOUPS @ USENIX Security Symposium 2018: 177-195 - [c49]Hala Assal, Sonia Chiasson:
Security in the Software Development Lifecycle. SOUPS @ USENIX Security Symposium 2018: 281-296 - [c48]Leah Zhang-Kennedy, Hala Assal, Jessica N. Rocheleau, Reham Mohamed, Khadija Baig, Sonia Chiasson:
The aftermath of a crypto-ransomware attack at a large academic institution. USENIX Security Symposium 2018: 1061-1078 - 2017
- [j11]Leah Zhang-Kennedy, Yomna Abdelaziz, Sonia Chiasson:
Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy. Int. J. Child Comput. Interact. 13: 10-18 (2017) - [c47]Leah Zhang-Kennedy, Khadija Baig, Sonia Chiasson:
Engaging Children About Online Privacy Through Storytelling in an Interactive Comic. BCS HCI 2017 - [c46]Leah Zhang-Kennedy, Robert Biddle, Sonia Chiasson:
Secure comics: an interactive comic series for improving cyber security and privacy. BCS HCI 2017 - [c45]Leah Zhang-Kennedy, Sonia Chiasson:
Cyberheroes: an interactive ebook for improving children's online privacy. BCS HCI 2017 - [c44]Kalpana Hundlani, Sonia Chiasson, Larry Hamid:
No passwords needed: the iterative design of a parent-child authentication mechanism. MobileHCI 2017: 45:1-45:11 - [c43]Rebecca Cooper, Hala Assal, Sonia Chiasson:
Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper). PST 2017: 191-196 - [c42]Reham Ebada Mohamed, Thaís Bardini Idalino, Sonia Chiasson:
When private and professional lives meet: The impact of digital footprints on employees and political candidates. SMSociety 2017: 48:1-48:5 - 2016
- [j10]Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle:
The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity. Int. J. Hum. Comput. Interact. 32(3): 215-257 (2016) - [j9]Sana Maqsood, Sonia Chiasson, Audrey Girouard:
Bend Passwords: using gestures to authenticate on flexible devices. Pers. Ubiquitous Comput. 20(4): 573-600 (2016) - [c41]Leah Zhang-Kennedy, Christine Mekhail, Yomna Abdelaziz, Sonia Chiasson:
From Nosy Little Brothers to Stranger-Danger: Children and Parents' Perception of Mobile Threats. IDC 2016: 388-399 - [c40]Leah Zhang-Kennedy, Sonia Chiasson:
Teaching with an Interactive E-book to Improve Children's Online Privacy Knowledge. IDC 2016: 506-511 - [c39]Stephanie Hurtado, Sonia Chiasson:
An Eye-tracking Evaluation of Driver Distraction and Unfamiliar Road Signs. AutomotiveUI 2016: 153-160 - [c38]Leah Zhang-Kennedy, Elias Fares, Sonia Chiasson, Robert Biddle:
Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends. eCrime 2016: 30-41 - [c37]Leah Zhang-Kennedy, Sonia Chiasson, Paul C. van Oorschot:
Revisiting password rules: facilitating human management of passwords. eCrime 2016: 81-90 - [c36]Malak Baslyman, Sonia Chiasson:
"Smells Phishy?": An educational game about online phishing scams. eCrime 2016: 91-101 - [c35]Hala Assal, Sonia Chiasson, Robert Biddle:
Cesar: Visual representation of source code vulnerabilities. VizSEC 2016: 1-8 - [i1]Hala Assal, Ahsan Imran, Sonia Chiasson:
An Exploration of Graphical Password Authentication for Children. CoRR abs/1610.09743 (2016) - 2015
- [j8]Sonia Chiasson, Paul C. van Oorschot:
Quantifying the security advantage of password expiration policies. Des. Codes Cryptogr. 77(2-3): 401-408 (2015) - [j7]Mohamed Alsharnouby, Furkan Alaca, Sonia Chiasson:
Why phishing still works: User strategies for combating phishing attacks. Int. J. Hum. Comput. Stud. 82: 69-82 (2015) - [j6]Alain Forget, Sonia Chiasson, Robert Biddle:
User-centred authentication feature framework. Inf. Comput. Secur. 23(5): 497-515 (2015) - [c34]Gerardo Reynaga, Sonia Chiasson, Paul C. van Oorschot:
Heuristics for the evaluation of captchas on smartphones. BCS HCI 2015: 126-135 - [c33]Hala Assal, Stephanie Hurtado, Ahsan Imran, Sonia Chiasson:
What's the deal with privacy apps?: a comprehensive exploration of user perception and usability. MUM 2015: 25-36 - [c32]Alain Forget, Sonia Chiasson, Robert Biddle:
Choose Your Own Authentication. NSPW 2015: 1-15 - [c31]Farah Chanchary, Sonia Chiasson:
User Perceptions of Sharing, Advertising, and Tracking. SOUPS 2015: 53-67 - 2014
- [j5]Sonia Chiasson, Heather Crawford, Serge Egelman, Pourang Irani:
Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices. Int. J. Mob. Hum. Comput. Interact. 6(2): 73-78 (2014) - [j4]Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot:
Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion. IEEE Trans. Dependable Secur. Comput. 11(5): 480-493 (2014) - [c30]Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle:
Stop Clicking on "Update Later": Persuading Users They Need Up-to-Date Antivirus Protection. PERSUASIVE 2014: 302-322 - 2013
- [c29]Fanny Lalonde Lévesque, Jude Nsiempba, José M. Fernandez, Sonia Chiasson, Anil Somayaji:
A clinical study of risk factors related to malware infections. CCS 2013: 97-108 - [c28]Sana Maqsood, Sonia Chiasson, Audrey Girouard:
Passwords on flexible display devices. CCS 2013: 1469-1472 - [c27]Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle:
Password advice shouldn't be boring: Visualizing password guessing attacks. eCrime 2013: 1-11 - [c26]Hsin-Yi Chiang, Sonia Chiasson:
Improving user authentication on mobile devices: a touchscreen graphical password. Mobile HCI 2013: 251-260 - [c25]Sonia Chiasson, Heather Crawford, Serge Egelman, Pourang Irani:
U-PriSM 2: the second usable privacy and security for mobile devices workshop. Mobile HCI 2013: 630-632 - [c24]Vanessa Boothroyd, Sonia Chiasson:
Writing down your password: Does it help? PST 2013: 267-274 - [c23]Gerardo Reynaga, Sonia Chiasson:
The Usability of CAPTCHAs on Smartphones. SECRYPT 2013: 427-434 - 2012
- [j3]Robert Biddle, Sonia Chiasson, Paul C. van Oorschot:
Graphical passwords: Learning from the first twelve years. ACM Comput. Surv. 44(4): 19:1-19:41 (2012) - [j2]Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, Paul C. van Oorschot:
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism. IEEE Trans. Dependable Secur. Comput. 9(2): 222-235 (2012) - [c22]Daniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, Paul C. van Oorschot:
Tapas: design, implementation, and usability evaluation of a password manager. ACSAC 2012: 89-98 - [c21]Muhammad Mahmoud, Sonia Chiasson, Ashraf Matrawy:
Does context influence responses to firewall warnings? eCrime Researchers Summit 2012: 1-10 - [c20]Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa, Bruna Freitas Machado, Alain Forget, Nicholas Wright, Gerry Chan, Robert Biddle:
The MVP Web-Based Authentication Framework - (Short Paper). Financial Cryptography 2012: 16-24 - [c19]Fanny Lalonde Lévesque, Carlton R. Davis, José M. Fernandez, Sonia Chiasson, Anil Somayaji:
Methodology for a Field Study of Anti-malware Software. Financial Cryptography Workshops 2012: 80-85 - [c18]Serge Egelman, Joseph Bonneau, Sonia Chiasson, David Dittrich, Stuart E. Schechter:
It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin. Financial Cryptography Workshops 2012: 124-132 - [c17]Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot:
Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion. USENIX Security Symposium 2012: 49-64 - 2010
- [c16]Elizabeth Stobert, Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle:
Exploring usability effects of increasing security in click-based graphical passwords. ACSAC 2010: 79-88 - [c15]Alain Forget, Sonia Chiasson, Robert Biddle:
Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. CHI 2010: 1107-1110 - [c14]Alain Forget, Sonia Chiasson, Robert Biddle:
Input precision for gaze-based graphical passwords. CHI Extended Abstracts 2010: 4279-4284
2000 – 2009
- 2009
- [j1]Sonia Chiasson, Alain Forget, Robert Biddle, Paul C. van Oorschot:
User interface design affects security: patterns in click-based graphical passwords. Int. J. Inf. Sec. 8(6): 387-398 (2009) - [c13]Sonia Chiasson, Alain Forget, Elizabeth Stobert, Paul C. van Oorschot, Robert Biddle:
Multiple password interference in text passwords and click-based graphical passwords. CCS 2009: 500-511 - [c12]Alain Forget, Sonia Chiasson, Robert Biddle:
Lessons from brain age on persuasion for computer security. CHI Extended Abstracts 2009: 4435-4440 - 2008
- [c11]Sonia Chiasson, Alain Forget, Robert Biddle, Paul C. van Oorschot:
Influencing users towards better passwords: persuasive cued click-points. BCS HCI (1) 2008: 121-130 - [c10]Alain Forget, Sonia Chiasson, Robert Biddle:
Lessons from Brain Age on password memorability. Future Play 2008: 262-263 - [c9]Sonia Chiasson, Jayakumar Srinivasan, Robert Biddle, Paul C. van Oorschot:
Centered Discretization with Application to Graphical Passwords. UPSEC 2008 - [c8]Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle:
Persuasion for Stronger Passwords: Motivation and Pilot Study. PERSUASIVE 2008: 140-150 - [c7]Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle:
Improving text passwords through persuasion. SOUPS 2008: 1-12 - 2007
- [c6]Sonia Chiasson, Paul C. van Oorschot, Robert Biddle:
Graphical Password Authentication Using Cued Click Points. ESORICS 2007: 359-374 - [c5]Alain Forget, Dave Arnold, Sonia Chiasson:
CASE-FX: feature modeling support in an OO Case tool. OOPSLA Companion 2007: 803-804 - [c4]Sonia Chiasson, Robert Biddle, Paul C. van Oorschot:
A second look at the usability of click-based graphical passwords. SOUPS 2007: 1-12 - [c3]Alain Forget, Sonia Chiasson, Robert Biddle:
Helping users create better passwords: is this the right approach? SOUPS 2007: 151-152 - 2006
- [c2]Sonia Chiasson, Paul C. van Oorschot, Robert Biddle:
A Usability Study and Critique of Two Password Managers. USENIX Security Symposium 2006 - 2005
- [c1]Sonia Chiasson, Carl Gutwin:
Testing the media equation with children. CHI 2005: 829-838
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 02:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint