Michelle L. Mazurek
University of Maryland, Baltimore
H-index: 43
North America-United States
Top articles of Michelle L. Mazurek
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Designing a Data-Driven Survey System: Leveraging Participants' Online Data to Personalize Surveys | Lev Velykoivanenko Kavous Salehzadeh Niksirat Stefan Teofanovic Michelle L Mazurek Bertil Chapuis | 2024 | |
Data Subjects’ Reactions to Exercising Their Right of Access | Arthur Borem Elleen Pan Olufunmilola Obielodan Aurelie Roubinowitz Luca Dovichi | 2024/8 | |
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends | arXiv preprint arXiv:2403.02292 | Omer Akgul Sai Teja Peddinti Nina Taft Michelle L Mazurek Hamza Harkous | 2024/3/4 |
Bug hunters’ perspectives on the challenges and benefits of the bug bounty ecosystem | Omer Akgul Taha Eghtesad Amit Elazari Omprakash Gnawali Jens Grossklags | 2023 | |
The Role of Professional Product Reviewers in Evaluating Security and Privacy | Wentao Guo Jason Walter Michelle L Mazurek | 2023 | |
Analysis of Google Ads Settings Over Time: Updated, Individualized, Accurate, and Filtered | Nathan Reitinger Bruce Wen Michelle L Mazurek Blase Ur | 2023/11/26 | |
How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities | Alan F Luo Noel Warford Samuel Dooley Rachel Greenstadt Michelle L Mazurek | 2023 | |
SoK: Safer Digital-Safety Research Involving At-Risk Users | arXiv preprint arXiv:2309.00735 | Rosanna Bellini Emily Tseng Noel Warford Alaa Daffalla Tara Matthews | 2023/9/1 |
Optimistic Access Control for the Smart Home | Nathan Malkin Alan F Luo Julio Poveda Michelle L Mazurek | 2023/5/21 | |
Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging | Nathan Reitinger Nathan Malkin Omer Akgul Michelle L Mazurek Ian Miers | 2023/5/21 | |
The Role of Product Reviewers in Evaluating Security and Privacy | 6th IEEE SPW Workshop on Technology and Consumer Protection (ConPro’22) | Wentao Guo Jason Walter Michelle L Mazurek | 2022/5 |
Understanding the how and the why: Exploring secure development practices through a course competition | Kelsey R Fulton Daniel Votipka Desiree Abrokwa Michelle L Mazurek Michael Hicks | 2022/11/7 | |
How ready is your ready? assessing the usability of incident response playbook frameworks | Rock Stevens Daniel Votipka Josiah Dykstra Fernando Tomlinson Erin Quartararo | 2022/4/29 | |
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery | Kelsey R Fulton Samantha Katcher Kevin Song Marshini Chetty Michelle L Mazurek | 2022/10/6 | |
Garbage Collection Makes Rust Easier to Use: A Randomized Controlled Trial of the Bronze Garbage Collector | Michael Coblenz Michelle L Mazurek Michael Hicks | 2022 | |
Why Users (Don’t) Use Password Managers at a Large Educational Institution | Peter Mayer Collins W Munyendo Michelle L Mazurek Adam J Aviv | 2022/8 | |
Above and Beyond: Organizational Efforts to Complement US Digital Security Compliance Mandates. | Rock Stevens Faris Bugra Kokulu Adam Doupé Michelle L. Mazurek | 2022/4 | |
Sok: A framework for unifying at-risk user research | Noel Warford Tara Matthews Kaitlyn Yang Omer Akgul Sunny Consolvo | 2022/5/22 | |
Characterizing Everyday Misuse of Smart Home Devices | Phoebe Moh Pubali Datta Noel Warford Adam Bates Nathan Malkin | 2023/5/21 | |
Investigating Influencer VPN Ads on YouTube | Omer Akgul Richard Roberts Moses Namara Dave Levin Michelle L Mazurek | 2022/5/22 |