Adrienne Porter Felt
Applied Filters
- Adrienne Porter Felt
- AuthorRemove filter
People
Colleagues
- David A Wagner (12)
- Erika Chin (5)
- Robert W. Reeder (5)
- Sunny Consolvo (5)
- Serge Egelman (4)
- Christopher Albert Thompson (3)
- Steven Craig Hanna (3)
- Alex Ainslie (2)
- Emily Stark (2)
- Hazim Almuhimedi (2)
- Helen Harris (2)
- Joel Weinberger (2)
- Kate Greenwood (2)
- Matthew Finifter (2)
- Maximilian Walker (2)
- Mustafa Emre Acer (2)
- Parisa Tabriz (2)
- David Evans (1)
- Mark S. Miller (1)
Roles
Publication
Proceedings/Book Names
- SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security (2)
- SOUPS '16: Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security (2)
- ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (1)
- ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (1)
- CCS '11: Proceedings of the 18th ACM conference on Computer and communications security (1)
- CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (1)
- CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (1)
- CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (1)
- CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (1)
- HotSec'12: Proceedings of the 7th USENIX conference on Hot Topics in Security (1)
- MobiSys '11: Proceedings of the 9th international conference on Mobile systems, applications, and services (1)
- SEC'11: Proceedings of the 20th USENIX conference on Security (1)
- SEC'13: Proceedings of the 22nd USENIX conference on Security (1)
- Security'12: Proceedings of the 21st USENIX conference on Security symposium (1)
- SocialNets '08: Proceedings of the 1st Workshop on Social Network Systems (1)
- SPSM '11: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (1)
- SPSM '12: Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices (1)
- Towards comprehensible and effective permission systems (1)
- WebApps'11: Proceedings of the 2nd USENIX conference on Web application development (1)
- WWW '10: Proceedings of the 19th international conference on World wide web (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- Article
The web's identity crisis: understanding the effectiveness of website identity indicators
- Christopher Thompson
Google
, - Martin Shelton
Google
, - Emily Stark
Google
, - Maximilian Walker
Google
, - Emily Schechter
Google
, - Adrienne Porter Felt
Google
Users must understand the identity of the website that they are visiting in order to make trust decisions. Web browsers indicate website identity via URLs and HTTPS certificates, but users must understand and act on these indicators for them to be ...
- 0Citation
MetricsTotal Citations0
- Christopher Thompson
- research-article
Web feature deprecation: a case study for chrome
- Ariana Mirian
University of California, San Diego
, - Nikunj Bhagat
Google Inc.
, - Caitlin Sadowski
Google Inc.
, - Adrienne Porter Felt
Google Inc.
, - Stefan Savage
University of California
, - Geoffrey M. Voelker
University of California
ICSE-SEIP '19: Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice•May 2019, pp 302-311• https://doi.org/10.1109/ICSE-SEIP.2019.00044Deprecation --- signaling that a function is becoming obsolete in the near future --- is necessary for the web ecosystem. However, an unsuccessful deprecation can lead to pain for both developers and end-users. In this paper, we analyze web feature ...
- 1Citation
- 59
- Downloads
MetricsTotal Citations1Total Downloads59Last 12 Months1
- Ariana Mirian
- research-articleOpen AccessPublished By ACMPublished By ACM
An Experience Sampling Study of User Reactions to Browser Warnings in the Field
- Robert W. Reeder
Google, Inc., Mountain View, CA, USA
, - Adrienne Porter Felt
Google, Inc., Mountain View, CA, USA
, - Sunny Consolvo
Google, Inc., Mountain View, CA, USA
, - Nathan Malkin
University of California, Berkeley, Berkeley, CA, USA
, - Christopher Thompson
University of California, Berkeley, Berkeley, CA, USA
, - Serge Egelman
University of California, Berkeley&International Computer Science Institute, Berkeley, CA, USA
CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems•April 2018, Paper No.: 512, pp 1-13• https://doi.org/10.1145/3173574.3174086Web browser warnings should help protect people from malware, phishing, and network attacks. Adhering to warnings keeps people safer online. Recent improvements in warning design have raised adherence rates, but they could still be higher. And prior ...
- 83Citation
- 2,868
- Downloads
MetricsTotal Citations83Total Downloads2,868Last 12 Months492Last 6 weeks59
- Robert W. Reeder
- research-articleOpen AccessPublished By ACMPublished By ACM
Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors
- Mustafa Emre Acer
Google Inc., Mountain View, CA, USA
, - Emily Stark
Google Inc., Mountain View, CA, USA
, - Adrienne Porter Felt
Google Inc., Mountain View, CA, USA
, - Sascha Fahl
Leibniz University Hannover, Hannover, Germany
, - Radhika Bhargava
Purdue University, West Lafayette, IN, USA
, - Bhanu Dev
International Institute of Information Technology, Hyderabad, Hyderabad, India
, - Matt Braithwaite
Google Inc., Mountain View, CA, USA
, - Ryan Sleevi
Google Inc., Mountain View, CA, USA
, - Parisa Tabriz
Google Inc., Mountain View, CA, USA
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security•October 2017, pp 1407-1420• https://doi.org/10.1145/3133956.3134007HTTPS error warnings are supposed to alert browser users to network attacks. Unfortunately, a wide range of non-attack circumstances trigger hundreds of millions of spurious browser warnings per month. Spurious warnings frustrate users, hinder the ...
- 32Citation
- 1,509
- Downloads
MetricsTotal Citations32Total Downloads1,509Last 12 Months199Last 6 weeks24- 1
Supplementary Materialemilystark-wildwarnings.mp4
- Mustafa Emre Acer
- Article
Measuring HTTPS adoption on the web
- Adrienne Porter Felt
Google
, - Richard Barnes
Cisco
, - April King
Mozilla
, - Chris Palmer
Google
, - Chris Bentzel
Google
, - Parisa Tabriz
Google
HTTPS ensures that the Web has a base level of privacy and integrity. Security engineers, researchers, and browser vendors have long worked to spread HTTPS to as much of the Web as possible via outreach efforts, developer tools, and browser changes. How ...
- 17Citation
MetricsTotal Citations17
- Adrienne Porter Felt
- Article
A week to remember: the impact of browser warning storage policies
- Joel Weinberger
Google, Inc.
, - Adrienne Porter Felt
Google, Inc.
SOUPS '16: Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security•June 2016, pp 15-25When someone decides to ignore an HTTPS error warning, how long should the browser remember that decision? If they return to the website in five minutes, an hour, a day, or a week, should the browser show them the warning again or respect their previous ...
- 2Citation
MetricsTotal Citations2
- Joel Weinberger
- Article
Rethinking connection security indicators
- Adrienne Porter Felt
Google
, - Robert W. Reeder
Google
, - Alex Ainslie
Google
, - Helen Harris
Google
, - Max Walker
Google
, - Christopher Thompson
UC Berkeley
, - Mustafa Emre Acer
Google
, - Elisabeth Morant
Google
, - Sunny Consolvo
Google
SOUPS '16: Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security•June 2016, pp 1-13We propose a new set of browser security indicators, based on user research and an understanding of the design challenges faced by browsers. To motivate the need for new security indicators, we critique existing browser security indicators and survey 1,...
- 12Citation
MetricsTotal Citations12
- Adrienne Porter Felt
- research-articleOpen AccessPublished By ACMPublished By ACM
Improving SSL Warnings: Comprehension and Adherence
- Adrienne Porter Felt
Google, Inc., Mountain View, CA, USA
, - Alex Ainslie
Google, Inc., Mountain View, CA, USA
, - Robert W. Reeder
Google, Inc., Mountain View, CA, USA
, - Sunny Consolvo
Google, Inc., Mountain View, CA, USA
, - Somas Thyagaraja
Google, Inc., Mountain View, CA, USA
, - Alan Bettes
Google, Inc., Mountain View, CA, USA
, - Helen Harris
Google, Inc., Mountain View, CA, USA
, - Jeff Grimes
University of Pennsylvania, Philadelphia, PA, USA
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems•April 2015, pp 2893-2902• https://doi.org/10.1145/2702123.2702442Browsers warn users when the privacy of an SSL/TLS connection might be at risk. An ideal SSL warning would empower users to make informed decisions and, failing that, guide confused users to safety. Unfortunately, users struggle to understand and often ...
- 110Citation
- 2,970
- Downloads
MetricsTotal Citations110Total Downloads2,970Last 12 Months345Last 6 weeks38
- Adrienne Porter Felt
- Article
Your reputation precedes you: history, reputation, and the chrome malware warning
- Hazim Almuhimedi
Carnegie Mellon University
, - Adrienne Porter Felt
Google, Inc.
, - Robert W. Reeder
Google, Inc.
, - Sunny Consolvo
Google, Inc.
SOUPS '14: Proceedings of the Tenth USENIX Conference on Usable Privacy and Security•July 2014, pp 113-128Several web browsers, including Google Chrome and Mozilla Firefox, use malware warnings to stop people from visiting infectious websites. However, users can choose to click through (i.e., ignore) these malware warnings. In Google Chrome, users click ...
- 5Citation
MetricsTotal Citations5
- Hazim Almuhimedi
- research-articlePublished By ACMPublished By ACM
Experimenting at scale with google chrome's SSL warning
- Adrienne Porter Felt
Google, Mountain View, CA, USA
, - Robert W. Reeder
Google, Inc., Mountain View, CA, USA
, - Hazim Almuhimedi
Carnegie Mellon University, Pittsburgh, PA, USA
, - Sunny Consolvo
Google, Inc. & University of Washington, Mountain View, CA, USA
CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems•April 2014, pp 2667-2670• https://doi.org/10.1145/2556288.2557292Web browsers show HTTPS authentication warnings (i.e., SSL warnings) when the integrity and confidentiality of users' interactions with websites are at risk. Our goal in this work is to decrease the number of users who click through the Google Chrome ...
- 51Citation
- 670
- Downloads
MetricsTotal Citations51Total Downloads670Last 12 Months43Last 6 weeks4
- Adrienne Porter Felt
- Article
Alice in warningland: a large-scale field study of browser security warning effectiveness
- Devdatta Akhawe
University of California, Berkeley
, - Adrienne Porter Felt
Google, Inc.
We empirically assess whether browser security warnings are as ineffective as suggested by popular opinion and previous literature. We used Mozilla Firefox and Google Chrome's in-browser telemetry to observe over 25 million warning impressions in situ. ...
- 68Citation
MetricsTotal Citations68
- Devdatta Akhawe
- research-articlePublished By ACMPublished By ACM
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
- Adrienne Porter Felt
University of California, Berkeley, Berkeley, CA, USA
, - Serge Egelman
University of California, Berkeley, Berkeley, CA, USA
, - David Wagner
University of California, Berkeley, Berkeley, CA, USA
SPSM '12: Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices•October 2012, pp 33-44• https://doi.org/10.1145/2381934.2381943Smartphone operating systems warn users when third-party applications try to access sensitive functions or data. However, all of the major smartphone platforms warn users about different application actions. To our knowledge, their selection of warnings ...
- 183Citation
- 2,002
- Downloads
MetricsTotal Citations183Total Downloads2,002Last 12 Months74Last 6 weeks5
- Adrienne Porter Felt
- Article
An evaluation of the Google Chrome extension security architecture
- Nicholas Carlini
University of California, Berkeley
, - Adrienne Porter Felt
University of California, Berkeley
, - David Wagner
University of California, Berkeley
Vulnerabilities in browser extensions put users at risk by providing a way for website and network attackers to gain access to users' private data and credentials. Extensions can also introduce vulnerabilities into the websites that they modify. In 2009,...
- 14Citation
MetricsTotal Citations14
- Nicholas Carlini
- Article
How to ask for permission
- Adrienne Porter Felt
University of California, Berkeley
, - Serge Egelman
University of California, Berkeley
, - Matthew Finifter
University of California, Berkeley
, - Devdatta Akhawe
University of California, Berkeley
, - David Wagner
University of California, Berkeley
Application platforms provide applications with access to hardware (e.g., GPS and cameras) and personal data. Modern platforms use permission systems to protect access to these resources. The nature of these permission systems vary widely across ...
- 33Citation
MetricsTotal Citations33
- Adrienne Porter Felt
- research-articlePublished By ACMPublished By ACM
Android permissions: user attention, comprehension, and behavior
- Adrienne Porter Felt
University of California, Berkeley
, - Elizabeth Ha
University of California, Berkeley
, - Serge Egelman
University of California, Berkeley
, - Ariel Haney
University of California, Berkeley
, - Erika Chin
University of California, Berkeley
, - David Wagner
University of California, Berkeley
SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security•July 2012, Article No.: 3, pp 1-14• https://doi.org/10.1145/2335356.2335360Android's permission system is intended to inform users about the risks of installing applications. When a user installs an application, he or she has the opportunity to review the application's permission requests and cancel the installation if the ...
- 715Citation
- 5,037
- Downloads
MetricsTotal Citations715Total Downloads5,037Last 12 Months257Last 6 weeks23
- Adrienne Porter Felt
- research-articlePublished By ACMPublished By ACM
Measuring user confidence in smartphone security and privacy
- Erika Chin
University of California, Berkeley
, - Adrienne Porter Felt
University of California, Berkeley
, - Vyas Sekar
Intel Labs
, - David Wagner
University of California, Berkeley
SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security•July 2012, Article No.: 1, pp 1-16• https://doi.org/10.1145/2335356.2335358In order to direct and build an effective, secure mobile ecosystem, we must first understand user attitudes toward security and privacy for smartphones and how they may differ from attitudes toward more traditional computing systems. What are users' ...
- 232Citation
- 5,312
- Downloads
MetricsTotal Citations232Total Downloads5,312Last 12 Months208Last 6 weeks15
- Erika Chin
- research-articlePublished By ACMPublished By ACM
AdDroid: privilege separation for applications and advertisers in Android
- Paul Pearce
University of California Berkeley
, - Adrienne Porter Felt
University of California Berkeley
, - Gabriel Nunez
Sandia National Laboratory
, - David Wagner
University of California Berkeley
ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security•May 2012, pp 71-72• https://doi.org/10.1145/2414456.2414498Advertising is a critical part of the Android ecosystem---many applications use one or more advertising services as a source of revenue. To use these services, developers must bundle third-party, binary-only libraries into their applications. In this ...
- 171Citation
- 1,185
- Downloads
MetricsTotal Citations171Total Downloads1,185Last 12 Months20
- Paul Pearce
- Doctoral Theses
Towards comprehensible and effective permission systems
- Adrienne Porter Felt
University of California, Berkeley
, - David Wagner
University of California, Berkeley
How can we, as platform designers, protect computer users from the threats associated with malicious, privacy-invasive, and vulnerable applications__ __ Modern platforms have turned away from the traditional user-based permission model and begun ...
- 0Citation
MetricsTotal Citations0
- Adrienne Porter Felt
- research-articlePublished By ACMPublished By ACM
Android permissions demystified
- Adrienne Porter Felt
University of California, Berkeley, Berkeley, CA, USA
, - Erika Chin
University of California, Berkeley, Berkeley, CA, USA
, - Steve Hanna
University of California, Berkeley, Berkeley, CA, USA
, - Dawn Song
University of California, Berkeley, Berkeley, CA, USA
, - David Wagner
University of California, Berkeley, Berkeley, CA, USA
CCS '11: Proceedings of the 18th ACM conference on Computer and communications security•October 2011, pp 627-638• https://doi.org/10.1145/2046707.2046779Android provides third-party applications with an extensive API that includes access to phone hardware, settings, and user data. Access to privacy- and security-relevant parts of the API is controlled with an install-time application permission system. ...
- 891Citation
- 7,933
- Downloads
MetricsTotal Citations891Total Downloads7,933Last 12 Months244Last 6 weeks15
- Adrienne Porter Felt
- research-articlePublished By ACMPublished By ACM
A survey of mobile malware in the wild
- Adrienne Porter Felt
University of California, Berkeley, Berkeley, CA, USA
, - Matthew Finifter
University of California, Berkeley, Berkeley, CA, USA
, - Erika Chin
University of California, Berkeley, Berkeley, CA, USA
, - Steve Hanna
University of California, Berkeley, Berkeley, CA, USA
, - David Wagner
University of California, Berkeley, Berkeley, CA, USA
SPSM '11: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices•October 2011, pp 3-14• https://doi.org/10.1145/2046614.2046618Mobile malware is rapidly becoming a serious threat. In this paper, we survey the current state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS, Android, and Symbian malware that spread in the wild from 2009 to 2011. We ...
- 505Citation
- 7,309
- Downloads
MetricsTotal Citations505Total Downloads7,309Last 12 Months92Last 6 weeks6
- Adrienne Porter Felt
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner