Publications

Also see my dblp, ACM Author, ORCHID, and Google Scholar profiles.


(2023). DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs. In Proceedings of the 8th IEEE European Symposium on Security and Privacy (EuroSP'23).

PDF Cite Dataset DOI

(2023). Twitter has a Binary Privacy Setting, are Users Aware of How It Works?. In Proceedings of the 2023 ACM SIGCHI Conference on Computer-Supported Cooperative Work and Social Computing (CSCW23).

PDF Cite Project DOI

(2022). Context-based Clustering to Mitigate Phishing Attacks. In Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security (AISec 2022).

PDF Cite Project Project DOI

(2022). PhishED: Automated contextual feedback for reporting phishing. In Proceedings of the Symposium on Usable Privacy and Security Poster Track.

PDF Cite Project Project

(2022). Lessons Learned From Recruiting Participants With Programming Skills for Empirical Privacy and Security Studies. In 1st International Workshop on Recruiting Participants for Empirical Software Engineering (RoPES'22).

PDF Cite Project

(2022). Understanding Privacy Switching Behaviour on Twitter. In Proceedings of the CHI Conference on Human Factors in Computing Systems.

PDF Cite Project Video DOI

(2021). I Don't Need an Expert! Making URL Phishing Features Human Comprehensible. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems.

PDF Cite DOI

(2021). Code-Level Dark Patterns: Exploring Ad~Networks' Misleading Code Samples with Negative Consequences for Users. In ``What Can CHI Do About Dark Patterns?’’ Workshop at CHI Conference on Human Factors in Computing Systems (CHI ‘21).

PDF Cite Project

(2021). Owning and Sharing: Privacy Perceptions of Smart Speaker Users. In Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing.

PDF Cite Project DOI

(2021). "Developers are Responsible": What Ad Networks Tell Developers About Privacy. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Late Breaking Work.

PDF Cite Project DOI

(2021). A Case Study of Phishing Incident Response in an Educational Organization. In Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing.

PDF Cite

(2020). Understanding Privacy-Related Questions on Stack Overflow. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.

PDF Cite Project

(2020). RubikAuth: Fast and Secure Authentication in Virtual Reality. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.

PDF Cite Project

(2020). Knowledge-driven Biometric Authentication in Virtual Reality. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.

PDF Cite

(2019). A Survey on Developer-Centred Security. In European Workshop on Usable Security (EuroUSEC) co-located with The IEEE European Symposium on Security and Privacy (EuroS&PW).

PDF Cite Dataset Project Slides

(2019). A Review of Human-and Computer-Facing URL Phishing Features. In IEEE European Symposium on Security and Privacy Workshops (EuroSPW).

PDF Cite

(2018). Automatic phishing detection versus user training, Is there a middle ground using XAI?. In Proceedings of the SICSA Workshop on Reasoning, Learning and Explainability.

PDF Cite Project

(2018). Permission Impossible: Teaching Firewall Configuration in a Game Environment. In Proceedings of the European Workshop on Usable Security (EuroUSEC'18).

PDF Cite DOI

(2018). Faheem: Explaining URLs to people using a Slack bot. In Symposium on Digital Behaviour Intervention for Cyber Security.

PDF Cite

(2017). Was my message read? Privacy and signaling on Facebook messenger. In Proceedings of the Conference on Human Factors in Computing Systems (CHI).

PDF Cite Dataset

(2017). Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks. In Proceedings of the Conference on Computer Supported Cooperative Work and Social Computing (CSCW).

PDF Cite

(2016). Understanding Saudis' privacy concerns when using WhatsApp. In Proceedings of the Workshop on Usable Security (USEC).

PDF Cite

(2016). Tales of Software Updates: The process of updating software. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.

PDF Cite Project

(2015). Poster: A User Study of WhatsApp Privacy Settings Among Arab Users. In Proceedings of the Symposium on Security and Privacy Poster Track.

PDF Cite

(2014). Betrayed By Updates: How Negative Experiences Affect Future Security. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.

PDF Cite Project

(2009). Real life challenges in access-control management. In Proceedings of the 27th international conference on Human factors in computing systems.

Cite

(2008). A user study of policy creation in a flexible access-control system. In CHI ‘08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems.

Cite DOI

(2008). A user study of policy creation in a flexible access-control system. CHI ‘08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems.

Cite DOI