Seguir
Jayati Dev
Jayati Dev
Comcast, Indiana University
E-mail confirmado em comcast.com - Página inicial
Título
Citado por
Citado por
Ano
A qualitative study on usability and acceptability of Yubico security key
S Das, G Russo, AC Dingman, J Dev, O Kenny, LJ Camp
Proceedings of the 7th workshop on socio-technical aspects in security and …, 2018
472018
Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India.
J Dev, S Das, LJ Camp
HAISA, 135-146, 2018
192018
Modularity is the key a new approach to social media privacy policies
S Das, J Dev, K Srinivasan
Proceedings of the 7th Mexican Conference on Human-computer Interaction, 1-4, 2018
172018
Why Johnny can't unsubscribe: Barriers to stopping unwanted email
J Dev, E Rader, S Patil
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
142020
Cross-national study on phishing resilience
S Gopavaram, J Dev, M Grobler, DI Kim, S Das, LJ Camp
Proceedings of the Workshop on Usable Security and Privacy (USEC), 2021
132021
Lessons learnt from comparing {WhatsApp} privacy concerns across saudi and indian populations
J Dev, P Moriano, LJ Camp
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 81-97, 2020
132020
Personalized WhatsApp privacy: demographic and cultural influences on Indian and Saudi users
J Dev, S Das, Y Rashidi, LJ Camp
Available at SSRN 3391021, 2019
132019
Iot marketplace: Willingness-to-pay vs. willingness-to-accept
S Gopavaram, J Dev, S Das, LJ Camp
Proceedings of the 20th Annual Workshop on the Economics of Information …, 2021
122021
User engagement with chatbots: a discursive psychology approach
J Dev, LJ Camp
Proceedings of the 2nd Conference on Conversational User Interfaces, 1-4, 2020
112020
Iotmarketplace: Informing purchase decisions with risk communication
SR Gopavaram, J Dev, S Das, J Camp
Working Paper, 2019, ftp://svn. soic. indiana. edu/pub/techreports/TR742. pdf, 2019
112019
Is visualization enough? evaluating the efficacy of mud-visualizer in enabling ease of deployment for manufacturer usage description (mud)
V Andalibi, J Dev, DI Kim, E Lear, LJ Camp
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
62021
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home
J Abbott, J Dev, D Kim, S Gopavaram, M Iyer, S Sadam, S Mare, ...
Proceedings of the 2022 European Symposium on Usable Security, 98-110, 2022
52022
Going Beyond Labels
S Gopavaram, J Dev, E Gumusel, LJ Camp
Workshop and Call for Papers on Cybersecurity Labeling Programs for …, 2021
42021
Making access control easy in IoT
V Andalibi, J Dev, DI Kim, E Lear, LJ Camp
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021
42021
Privacy preserving policy framework: User-aware and user-driven
S Das, J Dev, LJ Camp
TPRC47: The 47th Research Conference on Communication, Information and …, 2019
42019
Sanchari Das, and L Jean Camp. 2021. Cross-National Study on Phishing Resilience
S Gopavaram, J Dev, M Grobler, DI Kim
Proceedings of the Workshop on Usable Security and Privacy (USEC), 0
4
Lessons for labeling from risk communication
LJ Camp, SR Gopavaram, J Dev, E Gumusel
Response to Call for Papers on Cybersecurity Labeling Programs for Consumers …, 2021
32021
Understanding privacy concerns of whatsapp users in India: poster
J Dev, S Das, LJ Camp
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018
32018
Discussing privacy and surveillance on twitter: A case study of covid-19
J Dev
arXiv preprint arXiv:2006.06815, 2020
22020
Privacy preserving policy model framework
S Das, J Dev, LJ Camp
Available at SSRN, 2019
22019
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20