default search action
Robert W. Reeder
Person information
- affiliation: Google
- affiliation: Microsoft
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c32]Robert W. Reeder, Adrienne Porter Felt, Sunny Consolvo, Nathan Malkin, Christopher Thompson, Serge Egelman:
An Experience Sampling Study of User Reactions to Browser Warnings in the Field. CHI 2018: 512 - 2017
- [j5]Robert W. Reeder, Iulia Ion, Sunny Consolvo:
152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users. IEEE Secur. Priv. 15(5): 55-64 (2017) - 2016
- [c31]Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert W. Reeder, Sunny Consolvo:
"She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households. CHI 2016: 5921-5932 - [c30]Michael Thompson, Philip Taylor, Robert W. Reeder, Ulrich Kuhlmann, Cara Nolan, Jonathan Mason, Joshua V. Hall:
Exploring the Value of Simulations in Plant Health in the Developing World. JCSG 2016: 153-162 - [c29]Adrienne Porter Felt, Robert W. Reeder, Alex Ainslie, Helen Harris, Max Walker, Christopher Thompson, Mustafa Emre Acer, Elisabeth Morant, Sunny Consolvo:
Rethinking Connection Security Indicators. SOUPS 2016: 1-14 - 2015
- [c28]Adrienne Porter Felt, Alex Ainslie, Robert W. Reeder, Sunny Consolvo, Somas Thyagaraja, Alan Bettes, Helen Harris, Jeff Grimes:
Improving SSL Warnings: Comprehension and Adherence. CHI 2015: 2893-2902 - [c27]Iulia Ion, Rob Reeder, Sunny Consolvo:
"...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices. SOUPS 2015: 327-346 - 2014
- [c26]Richard Shay, Iulia Ion, Robert W. Reeder, Sunny Consolvo:
"My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking. CHI 2014: 2657-2666 - [c25]Adrienne Porter Felt, Robert W. Reeder, Hazim Almuhimedi, Sunny Consolvo:
Experimenting at scale with google chrome's SSL warning. CHI 2014: 2667-2670 - [c24]Hazim Almuhimedi, Adrienne Porter Felt, Robert W. Reeder, Sunny Consolvo:
Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning. SOUPS 2014: 113-128 - 2013
- [c23]Cristian Bravo-Lillo, Saranga Komanduri, Lorrie Faith Cranor, Robert W. Reeder, Manya Sleeper, Julie S. Downs, Stuart E. Schechter:
Your attention please: designing security-decision UIs to make genuine risks harder to ignore. SOUPS 2013: 6:1-6:12 - 2011
- [j4]Robert W. Reeder, Stuart E. Schechter:
When the Password Doesn't Work: Secondary Authentication for Websites. IEEE Secur. Priv. 9(2): 43-49 (2011) - [c22]Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea:
More than skin deep: measuring effects of the underlying model on access-control system usability. CHI 2011: 2065-2074 - [c21]Robert W. Reeder:
Usable access control for all. SACMAT 2011: 153-154 - 2010
- [c20]Heather Richter Lipford, Jason Watson, Michael Whitney, Katherine Froiland, Robert W. Reeder:
Visual vs. compact: a comparison of privacy policy interfaces. CHI 2010: 1111-1114
2000 – 2009
- 2009
- [j3]John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder:
Policy framework for security and privacy management. IBM J. Res. Dev. 53(2): 4 (2009) - [c19]Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea:
Real life challenges in access-control management. CHI 2009: 899-908 - [c18]Stuart E. Schechter, Serge Egelman, Robert W. Reeder:
It's not what you know, but who you know: a social approach to last-resort authentication. CHI 2009: 1983-1992 - [c17]Maritza L. Johnson, Steven M. Bellovin, Robert W. Reeder, Stuart E. Schechter:
Laissez-faire file sharing: access control designed for individuals at the endpoints. NSPW 2009: 1-10 - [c16]Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor:
A Comparative Study of Online Privacy Policies and Formats. Privacy Enhancing Technologies 2009: 37-55 - [c15]Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, Mary Ellen Zurko:
Usability meets access control: challenges and research opportunities. SACMAT 2009: 73-74 - [c14]Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, Robert W. Reeder:
A "nutrition label" for privacy. SOUPS 2009 - [c13]Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor:
A comparative study of online privacy policies and formats. SOUPS 2009 - [c12]Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor:
A user study of the expandable grid applied to P3P privacy policy visualization. SOUPS 2009 - [c11]Stuart E. Schechter, Serge Egelman, Robert W. Reeder:
It's not what you know, but who you know: a social approach to last-resort authentication. SOUPS 2009 - [c10]Stuart E. Schechter, Robert W. Reeder:
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication. SOUPS 2009 - 2008
- [c9]Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea:
A user study of policy creation in a flexible access-control system. CHI 2008: 543-552 - [c8]Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong:
Expandable grids for visualizing and authoring computer security policies. CHI 2008: 1473-1482 - [c7]Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor:
A user study of the expandable grid applied to P3P privacy policy visualization. WPES 2008: 45-54 - 2007
- [c6]Robert W. Reeder, Clare-Marie Karat, John Karat, Carolyn Brodie:
Usability Challenges in Security and Privacy Policy-Authoring Interfaces. INTERACT (2) 2007: 141-155 - 2006
- [c5]Robert W. Reeder, Roy A. Maxion:
User Interface Defect Detection by Hesitation Analysis. DSN 2006: 61-72 - 2005
- [j2]Robert W. Reeder, Fahd Arshad:
Soups 2005. IEEE Secur. Priv. 3(5): 47-50 (2005) - [j1]Roy A. Maxion, Robert W. Reeder:
Improving user-interface dependability through mitigation of human error. Int. J. Hum. Comput. Stud. 63(1-2): 25-50 (2005) - [c4]Robert W. Reeder, Roy A. Maxion:
User Interface Dependability through Goal-Error Prevention. DSN 2005: 60-69 - 2002
- [c3]Peter Pirolli, Wai-Tat Fu, Robert W. Reeder, Stuart K. Card:
A user-tracing architecture for modeling interaction with the world wide web. AVI 2002: 75-83 - 2001
- [c2]Robert W. Reeder, Peter Pirolli, Stuart K. Card:
WebEyeMapper and WebLogger: tools for analyzing eye tracking data collected in web-use studies. CHI Extended Abstracts 2001: 19-20 - [c1]Stuart K. Card, Peter Pirolli, Mija M. Van Der Wege, Julie Bauer Morrison, Robert W. Reeder, Pamela K. Schraedley, Jenea Boshart:
Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability. CHI 2001: 498-505
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint