default search action
Kami Vaniea
Person information
- affiliation: University of Waterloo, Ontario, Canada
- affiliation (former): University of Edinburgh, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c41]Adam D. G. Jenkins, Linsen Liu, Maria K. Wolters, Kami Vaniea:
Not as easy as just update: Survey of System Administrators and Patching Behaviours. CHI 2024: 972:1-972:17 - [i8]Tarini Saka, Rachiyta Jain, Kami Vaniea, Nadin Kökciyan:
Phishing Codebook: A Structured Framework for the Characterization of Phishing Emails. CoRR abs/2408.08967 (2024) - 2023
- [j9]Kholoud Althobaiti, Maria K. Wolters, Nawal Alsufyani, Kami Vaniea:
Using Clustering Algorithms to Automatically Identify Phishing Campaigns. IEEE Access 11: 96502-96513 (2023) - [j8]Mohammad Tahaei, Kami Vaniea, Awais Rashid:
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions. IEEE Secur. Priv. 21(1): 49-57 (2023) - [j7]Dilara Keküllüoglu, Kami Vaniea, Maria K. Wolters, Walid Magdy:
Twitter has a Binary Privacy Setting, are Users Aware of How It Works? Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-18 (2023) - [c40]Nicole Meng-Schneider, Rabia Yasa Kostas, Kami Vaniea, Maria K. Wolters:
Multi-User Smart Speakers - A Narrative Review of Concerns and Problematic Interactions. CHI Extended Abstracts 2023: 213:1-213:7 - [c39]Daniel Kirkman, Kami Vaniea, Daniel W. Woods:
DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs. EuroS&P 2023: 847-867 - [i7]Adam D. G. Jenkins, Maria Wolters, Kami Vaniea:
To Patch, or not To Patch? That is the Question: A Case Study of System Administrators' Online Collaborative Behaviour. CoRR abs/2307.03609 (2023) - 2022
- [j6]Florian Mathis, Kami Vaniea, Mohamed Khamis:
Prototyping Usable Privacy and Security Systems: Insights from Experts. Int. J. Hum. Comput. Interact. 38(5): 468-490 (2022) - [j5]Mohammad Tahaei, Tianshi Li, Kami Vaniea:
Understanding Privacy-Related Advice on Stack Overflow. Proc. Priv. Enhancing Technol. 2022(2): 114-131 (2022) - [c38]Florian Mathis, Joseph O'Hagan, Kami Vaniea, Mohamed Khamis:
Stay Home! Conducting Remote Usability Evaluations of Novel Real-World Authentication Systems Using Virtual Reality. AVI 2022: 14:1-14:9 - [c37]Tarini Saka, Kami Vaniea, Nadin Kökciyan:
Context-Based Clustering to Mitigate Phishing Attacks. AISec@CCS 2022: 115-126 - [c36]Dilara Keküllüoglu, Kami Vaniea, Walid Magdy:
Understanding Privacy Switching Behaviour on Twitter. CHI 2022: 31:1-31:14 - [c35]Mohammad Tahaei, Kami Vaniea:
Recruiting Participants With Programming Skills: A Comparison of Four Crowdsourcing Platforms and a CS Student Mailing List. CHI 2022: 590:1-590:15 - [c34]Dilara Keküllüoglu, Walid Magdy, Kami Vaniea:
From an Authentication Question to a Public Social Event: Characterizing Birthday Sharing on Twitter. ICWSM 2022: 488-499 - [c33]Florian Mathis, Joseph O'Hagan, Mohamed Khamis, Kami Vaniea:
Virtual Reality Observations: Using Virtual Reality to Augment Lab-Based Shoulder Surfing Research. VR 2022: 291-300 - [c32]Florian Mathis, Kami Vaniea, Mohamed Khamis:
Can I Borrow Your ATM? Using Virtual Reality for (Simulated) In Situ Authentication Research. VR 2022: 301-310 - [i6]Dilara Keküllüoglu, Walid Magdy, Kami Vaniea:
From an Authentication Question to a Public Social Event: Characterizing Birthday Sharing on Twitter. CoRR abs/2201.10655 (2022) - [i5]Dilara Keküllüoglu, Kami Vaniea, Walid Magdy:
Understanding Privacy Switching Behaviour on Twitter. CoRR abs/2203.08935 (2022) - [i4]Mohammad Tahaei, Kami Vaniea, Awais Rashid:
Embedding Privacy Into Design Through Software Developers: Challenges & Solutions. CoRR abs/2208.11898 (2022) - [i3]Dilara Keküllüoglu, Kami Vaniea, Maria K. Wolters, Walid Magdy:
Twitter has a Binary Privacy Setting, are Users Aware of How It Works? CoRR abs/2211.12206 (2022) - 2021
- [j4]Nicole Meng, Dilara Keküllüoglu, Kami Vaniea:
Owning and Sharing: Privacy Perceptions of Smart Speaker Users. Proc. ACM Hum. Comput. Interact. 5(CSCW1): 45:1-45:29 (2021) - [j3]Kholoud Althobaiti, Adam D. G. Jenkins, Kami Vaniea:
A Case Study of Phishing Incident Response in an Educational Organization. Proc. ACM Hum. Comput. Interact. 5(CSCW2): 338:1-338:32 (2021) - [j2]Florian Mathis, John H. Williamson, Kami Vaniea, Mohamed Khamis:
Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing. ACM Trans. Comput. Hum. Interact. 28(1): 6:1-6:44 (2021) - [c31]Mohammad Tahaei, Kami Vaniea:
"Developers Are Responsible": What Ad Networks Tell Developers About Privacy. CHI Extended Abstracts 2021: 253:1-253:11 - [c30]Florian Mathis, Kami Vaniea, Mohamed Khamis:
RepliCueAuth: Validating the Use of a Lab-Based Virtual Reality Setup for Evaluating Authentication Systems. CHI 2021: 534:1-534:18 - [c29]Mohammad Tahaei, Kami Vaniea, Konstantin Beznosov, Maria K. Wolters:
Security Notifications in Static Analysis Tools: Developers' Attitudes, Comprehension, and Ability to Act on Them. CHI 2021: 691:1-691:17 - [c28]Mohammad Tahaei, Alisa Frik, Kami Vaniea:
Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges. CHI 2021: 693:1-693:15 - [c27]Kholoud Althobaiti, Nicole Meng, Kami Vaniea:
I Don't Need an Expert! Making URL Phishing Features Human Comprehensible. CHI 2021: 695:1-695:17 - [c26]Florian Mathis, Kami Vaniea, Mohamed Khamis:
Observing Virtual Avatars: The Impact of Avatars' Fidelity on Identifying Interactions. MindTrek 2021: 154-164 - [c25]Mohammad Tahaei, Alisa Frik, Kami Vaniea:
Deciding on Personalized Ads: Nudging Developers About User Privacy. SOUPS @ USENIX Security Symposium 2021: 573-596 - [i2]Mohammad Tahaei, Adam D. G. Jenkins, Kami Vaniea, Maria Wolters:
"I Don't Know Too Much About It": On the Security Mindsets of Computer Science Students. CoRR abs/2103.09905 (2021) - 2020
- [c24]Sara Albakry, Kami Vaniea, Maria K. Wolters:
What is this URL's Destination? Empirical Evaluation of Users' URL Reading. CHI 2020: 1-12 - [c23]Florian Mathis, John Williamson, Kami Vaniea, Mohamed Khamis:
RubikAuth: Fast and Secure Authentication in Virtual Reality. CHI Extended Abstracts 2020: 1-9 - [c22]Mohammad Tahaei, Kami Vaniea, Naomi Saphra:
Understanding Privacy-Related Questions on Stack Overflow. CHI 2020: 1-14 - [c21]Adam D. G. Jenkins, Pieris Kalligeros, Kami Vaniea, Maria K. Wolters:
"Anyone Else Seeing this Error?": Community, System Administrators, and Patch Information. EuroS&P 2020: 105-119 - [c20]Mattia Mossano, Kami Vaniea, Lukas Aldag, Reyhan Düzgün, Peter Mayer, Melanie Volkamer:
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector. EuroS&P Workshops 2020: 130-139 - [c19]Dilara Keküllüoglu, Walid Magdy, Kami Vaniea:
Analysing Privacy Leakage of Life Events on Twitter. WebSci 2020: 287-294
2010 – 2019
- 2019
- [c18]Mohammad Tahaei, Kami Vaniea:
A Survey on Developer-Centred Security. EuroS&P Workshops 2019: 129-138 - [c17]Kholoud Althobaiti, Ghaidaa Rummani, Kami Vaniea:
A Review of Human- and Computer-Facing URL Phishing Features. EuroS&P Workshops 2019: 182-191 - [c16]Mohammad Tahaei, Adam D. G. Jenkins, Kami Vaniea, Maria Wolters:
"I Don't Know Too Much About It": On the Security Mindsets of Computer Science Students. STAST 2019: 27-46 - 2018
- [c15]Sara Albakry, Kami Vaniea:
Automatic Phishing Detection vesus User Training, Is there a Middle Ground Using XAI? SICSA ReaLX 2018 - 2017
- [c14]Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J. Lee, Kami Vaniea:
Was my message read?: Privacy and Signaling on Facebook Messenger. CHI 2017: 3838-3842 - [c13]Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J. Lee, Kami Vaniea:
Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks. CSCW 2017: 555-566 - [i1]Kami Vaniea, Ella Tallyn, Chris Speed:
Capturing the Connections: Unboxing Internet of Things Devices. CoRR abs/1708.00076 (2017) - 2016
- [j1]M. Angela Sasse, Matthew Smith, Cormac Herley, Heather Lipford, Kami Vaniea:
Debunking Security-Usability Tradeoff Myths. IEEE Secur. Priv. 14(5): 33-39 (2016) - [c12]Kami Vaniea, Yasmeen Rashidi:
Tales of Software Updates: The process of updating software. CHI 2016: 3215-3226 - 2015
- [c11]Donghee Yvette Wohn, Jacob Solomon, Dan Sarkar, Kami Vaniea:
Factors Related to Privacy Concerns and Protection Behaviors Regarding Behavioral Advertising. CHI Extended Abstracts 2015: 1965-1970 - 2014
- [c10]Kami Vaniea, Emilee J. Rader, Rick Wash:
Betrayed by updates: how negative experiences affect future security. CHI 2014: 2671-2674 - [c9]Rick Wash, Emilee J. Rader, Kami Vaniea, Michelle Rizor:
Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences. SOUPS 2014: 89-104 - 2012
- [c8]Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter:
Out of sight, out of mind: Effects of displaying access-control information near the item it controls. PST 2012: 128-136 - 2011
- [c7]Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea:
More than skin deep: measuring effects of the underlying model on access-control system usability. CHI 2011: 2065-2074 - 2010
- [c6]Michelle L. Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, Michael K. Reiter:
Access control for home data sharing: evaluating social acceptability. CHI 2010: 645-654
2000 – 2009
- 2009
- [c5]Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea:
Real life challenges in access-control management. CHI 2009: 899-908 - 2008
- [c4]Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea:
A user study of policy creation in a flexible access-control system. CHI 2008: 543-552 - [c3]Kami Vaniea, Clare-Marie Karat, Joshua B. Gross, John Karat, Carolyn Brodie:
Evaluating assistance of natural language policy authoring. SOUPS 2008: 65-73 - 2007
- [c2]Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea:
Lessons learned from the deployment of a smartphone-based access-control system. SOUPS 2007: 64-75 - [c1]Jason Cornwell, Ian Fette, Gary Hsieh, Madhu K. Prabaker, Jinghai Rao, Karen P. Tang, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Jason I. Hong, Bruce M. McLaren, Mike Reiter, Norman M. Sadeh:
User-Controllable Security and Privacy for Pervasive Computing. HotMobile 2007: 14-19
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint