Browse by UCL people
Group by: Type | Date
Number of items: 39.
Article
Becker, IF;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, S;
Sasse, MA;
(2017)
International comparison of bank fraud reimbursement: customer perceptions and contractual terms.
Journal of Cybersecurity
, 3
(2)
pp. 109-125.
10.1093/cybsec/tyx011.
|
Blackwell, Daniel;
Becker, Ingolf;
Clark, David;
(2024)
Hyperfuzzing: black-box security hypertesting with a grey-box fuzzer.
Empirical Software Engineering
, 30
, Article 22. 10.1007/s10664-024-10556-3.
|
Buckley, Gerard;
Caulfield, Tristan;
Becker, Ingolf;
(2024)
GDPR and the indefinable effectiveness of privacy regulators: Can performance assessment be improved?
Journal of Cybersecurity
(In press).
|
Buckley, Gerard;
Caulfield, Tristan;
Becker, Ingolf;
(2024)
How might the GDPR evolve? A question of politics, pace and punishment.
Computer Law & Security Review
, 54
, Article 106033. 10.1016/j.clsr.2024.106033.
|
Morris, J;
Becker, I;
Parkin, S;
(2020)
An Analysis of Perceptions and Support for Windows 10 Home Edition Update Features.
Journal of Cybersecurity
, 6
(1)
, Article tyaa017. 10.1093/cybsec/tyaa017.
|
Weir, Charles;
Becker, Ingolf;
Blair, Lynne;
(2022)
Incorporating software security: Using developer workshops to engage product managers.
Empirical Software Engineering
, 28
, Article 21. 10.1007/s10664-022-10252-0.
|
Weir, C;
Becker, I;
Noble, J;
Blair, L;
Sasse, MA;
Rashid, A;
(2020)
Interventions for long‐term software security: Creating a lightweight program of assurance techniques for developers.
Software: Practice and Experience
, 50
(3)
pp. 275-298.
10.1002/spe.2774.
|
Proceedings paper
Beautement, A;
Becker, I;
Parkin, S;
Krol, K;
Sasse, MA;
(2016)
Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.
In:
Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2016.
(pp. pp. 253-270).
USENIX Association: Denver, CO, USA.
|
Becker, I;
Posner, R;
Islam, T;
Ekblom, P;
Borrion, H;
McGuire, M;
Li, S;
(2021)
Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation.
In:
Proceedings of the 54th Hawaii International Conference on System Sciences.
(pp. pp. 5347-5356).
Shidler College of Business, University of Hawaii at Manoa: Honolulu, HI, USA.
|
Becker, I;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, SJ;
Sasse, MA;
(2016)
International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
In:
Proceedings of the 15th Annual Workshop on the Economics of Information Security (WEIS).
Workshop on the Economics of Information Security (WEIS): Berkeley, CA, USA.
(In press).
|
Becker, I;
Parkin, S;
Sasse, MA;
(2018)
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength.
In:
27th USENIX Security Symposium.
(pp. pp. 239-253).
USENIX Association
|
Becker, I;
Parkin, S;
Sasse, MA;
(2017)
Measuring the Success of Context-Aware Security Behaviour Surveys.
In:
The LASER Workshop: Learning from Authoritative Security Experiment Results.
USENIX Association: Arlington, VA, USA.
|
Becker, I;
Parkin, S;
Sasse, MA;
(2016)
Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations.
In:
Proceedings of the 4th Learning from Authoritative Security Experiment Results (LASER) Workshop.
(pp. pp. 43-53).
IEEE: San Jose, CA, USA.
|
Becker, IF;
Parkin, S;
Sasse, MA;
Finding Security Champions in Blends of Organisational Culture.
In:
Proceedings of the 2nd European Workshop on Usable Security - 2017.
Internet Society: Paris, France.
|
Buckley, Gerard;
Caulfield, Tristan;
Becker, Ingolf;
(2023)
“It May Be a Pain in the Backside but...” Insights into the Resilience of Business after GDPR.
In:
New Security Paradigms Workshop (NSPW ’22).
ACM: North Conway, NH, USA.
(In press).
|
Demetriou, K;
Becker, I;
Hailes, S;
(2022)
Who Watches the Watchers: A Multi-Task Benchmark for Anomaly Detection.
In:
Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP.
(pp. pp. 579-586).
International Conference on Information Systems Security and Privacy (ICISSP): Online conference.
|
Demjaha, A;
Spring, JM;
Becker, I;
Parkin, S;
Sasse, MA;
(2018)
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption.
In: Acar, Y and Patil, S, (eds.)
Proceedings of the NDSS Symposium 2018.
Internet Society: San Diego, CA, USA.
|
Dodier-Lazaro, S;
Abu-Salma, R;
Becker, I;
Sasse, MA;
(2017)
From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design.
In:
Position Papers.
Values In Computing.
|
Dodier-Lazaro, S;
Becker, I;
Krinke, J;
Sasse, MA;
(2017)
"No Good Reason to Remove Features": Expert Users Value Useful Apps over Secure Ones.
In: Tryfonas, T, (ed.)
HAS 2017: Human Aspects of Information Security, Privacy and Trust.
(pp. pp. 25-44).
Springer: Cham, Switzerland.
|
Islam, T;
Becker, I;
Posner, R;
Ekblom, P;
McGuire, M;
Borrion, H;
Li, S;
(2019)
A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems.
In: Wang, G and Bhuiyan, M and De Capitani, di Vimercati S and Ren Y, Y, (eds.)
Communications in Computer and Information Science.
Springer: Singapore.
|
Morris, J;
Becker, I;
Parkin, S;
(2019)
In Control with No Control: Perceptions and Reality of Windows 10 Home Edition Update Features.
In:
Proceedings of Workshop on Usable Security (USEC) 2019.
NDSS Symposium: San Diego, CA, USA.
|
Murdoch, SJ;
Becker, I;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Hutchings, A;
Sasse, MA;
(2016)
Are Payment Card Contracts Unfair?
In: Grossklags, J and Preneel, B, (eds.)
International Conference on Financial Cryptography and Data Security FC 2016: Financial Cryptography and Data Security.
(pp. pp. 600-608).
Springer
|
Parkin, S;
Krol, K;
Becker, I;
Sasse, MA;
(2016)
Applying Cognitive Control Modes to Identify Security Fatigue Hotspots.
In:
(Proceedings) Workshop on Security Fatigue, [part of] SOUPS 2016: Twelfth Symposium on Usable Privacy and Security, 22-24 June 2016, Denver, Colorado, USA.
USENIX Association
|
Sombatruang, N;
Caulfield, T;
Becker, I;
Fujita, A;
Kasama, T;
Nakao, K;
Inoue, D;
(2023)
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT.
In:
Proceedings of USENIX Security '23.
USENIX Association: Anaheim, CA, USA.
(In press).
|
Weir, C;
Becker, I;
Blair, L;
(2021)
A Passion for Security: Intervening to Help Software Developers.
In:
Proceedings of the 43rd International Conference on Software Engineering.
IEEE: Virtual conference.
(In press).
|
Weir, C;
Becker, I;
Noble, J;
Blair, L;
Sasse, MA;
Rashid, A;
(2019)
Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers.
In: Sharpe, Helen and Whalen, Michael, (eds.)
Proceedings of 41st International Conference on Software Engineering.
(pp. pp. 41-50).
IEEE: NY, USA.
|
Weir, CAF;
Blair, L;
Noble, J;
Becker, I;
Sasse, MA;
(2018)
Light-Touch Interventions to Improve Software Development Security.
In: Doyle, Dinara and Lerner, Lee W, (eds.)
Proceedings of the IEEE Cybersec Developmental Conference (SecDev '18).
IEEE Xplore: Piscataway, NJ, USA.
|
Zheng, Sarah;
Becker, Ingolf;
(2023)
Checking, Nudging or Scoring? Evaluating e-Mail User Security Tools.
In:
Nineteenth Symposium on Usable Privacy and Security.
USENIX Association: Anaheim, CA, USA.
(In press).
|
Zheng, Sarah;
Becker, Ingolf;
(2022)
Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection.
In:
Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022).
USENIX Association: Boston, MA, USA.
|
Zheng, Sarah Y;
Becker, Ingolf;
(2023)
Phishing to improve detection.
In:
Proceedings of the 2023 European Symposium on Usable Security (EuroUSEC 2023).
ACM (Association for Computing Machinery)
(In press).
|
Report
Dodier-Lazaro, S;
Becker, I;
Krinke, J;
Sasse, M;
(2017)
No Good Reason to Remove Features: Expert Users Value Useful Apps over Secure Ones.
(UCL Computer Science Research Notes
17/03
).
UCL Computer Science: London.
|
Thesis
Becker, Ingolf;
(2019)
Measuring and Understanding Security Behaviours.
Doctoral thesis (Ph.D), UCL (University College London).
|
Dataset
Beautement, A;
Becker, IF;
Krol, K;
Parkin, S;
Sasse, MA;
(2016)
Productive Security: A scalable methodology for analysing employee security behaviours.
[Dataset].
UCL Computer Science: London, UK.
|
Becker, IF;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, SJ;
Sasse, A;
(2017)
International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
[Dataset].
UCL Computer Science: London, UK.
|
Becker, IF;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, SJ;
Sasse, MA;
(2016)
International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
[Dataset].
UCL Computer Science
|
Becker, IF;
Parkin, S;
Sasse, MA;
(2017)
Measuring the Success of Context-Aware Security Behaviour Surveys.
[Dataset].
UCL Department of Computer Science: London, UK.
|
Demjaha, A;
Spring, J;
Becker, IF;
Parkin, S;
Sasse, MA;
(2018)
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption.
[Dataset].
UCL Jill Dando Institute of Security and Crime Science: London, UK.
|
Morris, J;
Becker, IF;
Parkin, S;
(2019)
In Control with no Control: Perceptions and Reality of Windows 10 Home Edition Update Features.
[Dataset].
UCL (Department of Security and Crime Science): Workshop on Usable Security, USEC '19.
|
Murdoch, SJ;
Becker, I;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Hutchings, A;
Sasse, A;
(2015)
Are payment card contracts unfair?
[Dataset].
UCL Department of Computer Science: London, UK.
|