Author: Ponnurangam Kumaraguru
Publication Overview
Publication period start: 2012
Number of co-authors: 25
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Kumaraguru,
Ponnurangam,
Rhee,
Yong,
Acquisti,
Alessandro,
Cranor,
Lorrie Faith,
Hong,
Jason,
Nunge,
Elizabeth
(2007):
Protecting people from phishing: the design and evaluation of an embedded training email s.
In:
Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems
,
2007,
.
pp. 905-914.
https://doi.acm.org/10.1145/1240624.1240760
Kumaraguru,
Ponnurangam,
Rhee,
Yong,
Sheng,
Steve,
Hasan,
Sharique,
Acquisti,
Alessandro,
Cranor,
Lorrie Faith,
Hong,
Jason
(2007):
Getting users to pay attention to anti-phishing education: evaluation of retention and tra.
In:
Proceedings of the 2007 Anti-Phishing Working Groups eCrime Researchers Summit
,
2007,
.
pp. 70-81.
https://doi.acm.org/10.1145/1299015.1299022
Sheng,
Steve,
Magnien,
Bryant,
Kumaraguru,
Ponnurangam,
Acquisti,
Alessandro,
Cranor,
Lorrie Faith,
Hong,
Jason,
Nunge,
Elizabeth
(2007):
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall fo.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 88-99.
https://cups.cs.cmu.edu/soups/2007/proceedings/p88_sheng.pdf
Kumaraguru,
Ponnurangam,
Cranshaw,
Justin,
Acquisti,
Alessandro,
Cranor,
Lorrie,
Hong,
Jason,
Blair,
Mary Ann,
Pham,
Theodore
(2009):
School of phish: a real-word evaluation of anti-phishing training.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 3.
https://doi.acm.org/10.1145/1572532.1572536
Ion,
Iulia,
Langheinrich,
Marc,
Kumaraguru,
Ponnurangam,
Capkun,
Srdjan
(2010):
Influence of user perception, security needs, and social factors on device pairing method .
In:
Proceedings of the 2010 Symposium on Usable Privacy and Security
,
2010,
.
pp. 6.
https://doi.acm.org/10.1145/1837110.1837118
Sheng,
Steve,
Holbrook,
Mandy,
Kumaraguru,
Ponnurangam,
Cranor,
Lorrie Faith,
Downs,
Julie
(2010):
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness .
In:
Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems
,
2010,
.
pp. 373-382.
https://doi.acm.org/10.1145/1753326.1753383
Khot,
Rohit Ashok,
Srinathan,
Kannan,
Kumaraguru,
Ponnurangam
(2011):
MARASIM: a novel jigsaw based authentication scheme using tagging.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 2605-2614.
https://dx.doi.org/10.1145/1978942.1979322
Ion,
Iulia,
Sachdeva,
Niharika,
Kumaraguru,
Ponnurangam,
Èapkun,
Srdjan
(2011):
Home is safer than the cloud!: privacy concerns for consumer cloud storage.
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 13.
https://dx.doi.org/10.1145/2078827.2078845
Pontes,
Tatiana,
Vasconcelos,
Marisa,
Almeida,
Jussara,
Kumaraguru,
Ponnurangam,
Almeida,
Virgilio
(2012):
We know where you live: privacy characterization of foursquare behavior.
In:
Proceedings of the 2012 International Conference on Uniquitous Computing
,
2012,
.
pp. 898-905.