Ingolf Becker
Ingolf Becker
Verified email at cs.ucl.ac.uk - Homepage
Title
Cited by
Cited by
Year
Productive security: A scalable methodology for analysing employee security behaviours
A Beautement, I Becker, S Parkin, K Krol, A Sasse
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 253-270, 2016
362016
Finding Security Champions in Blends of Organisational Culture
I Becker, S Parkin, MA Sasse
EuroUSEC '17, 2017
172017
From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design
MAS Steve Dodier-Lazaro, Ruba Abu-Salma, Ingolf Becker
CHI 2017 Workshop on Values in Computing, 7, 2017
152017
Applying cognitive control modes to identify security fatigue hotspots
S Parkin, K Krol, I Becker, MA Sasse
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 2016
152016
International comparison of bank fraud reimbursement: customer perceptions and contractual terms
I Becker, A Hutchings, R Abu-Salma, R Anderson, N Bohm, SJ Murdoch, ...
Journal of Cybersecurity 3 (2), 109-125, 2017
122017
Dataset: Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption
A Demjaha, J Spring, IF Becker, S Parkin, MA Sasse
UCL Jill Dando Institute of Security and Crime Science, 2018
10*2018
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption
A Demjaha, J Spring, IF Becker, S Parkin, MA Sasse
Workshop on Usable Security (USEC 2018), 2018
102018
A socio-technical and co-evolutionary framework for reducing human-related risks in cyber security and cybercrime ecosystems
T Islam, I Becker, R Posner, P Ekblom, M McGuire, H Borrion, S Li
International Conference on Dependability in Sensor, Cloud, and Big Data …, 2019
82019
Interventions for software security: creating a lightweight program of assurance techniques for developers
C Weir, I Becker, J Noble, L Blair, A Sasse, A Rashid
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
82019
Light-touch interventions to improve software development security
C Weir, L Blair, I Becker, A Sasse, J Noble
2018 IEEE Cybersecurity Development (SecDev), 85-93, 2018
72018
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength
I Becker, S Parkin, MA Sasse
27th USENIX Security Symposium (USENIX Security 18), 2018
72018
No Good Reason to Remove Features: Expert Users Value Useful Apps over Secure Ones
S Dodier-Lazaro, I Becker, J Krinke, A Sasse
HCI International 2017, 12, 2017
6*2017
Are payment card contracts unfair?
SJ Murdoch, I Becker, R Abu-Salma, R Anderson, N Bohm, A Hutchings, ...
Financial Crypto, 2016
6*2016
Interventions for long‐term software security: Creating a lightweight program of assurance techniques for developers
C Weir, I Becker, J Noble, L Blair, MA Sasse, A Rashid
Software: Practice and Experience 50 (3), 275-298, 2020
52020
Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations
I Becker, S Parkin, MA Sasse
Learning from Authoritative Security Experiment Results (LASER), 2016
52016
In Control with no Control: Perceptions and Reality of Windows 10 Home Edition Update Features
J Morris, I Becker, S Parkin
Workshop on Usable Security (USEC), 2019
22019
Measuring the Success of Context-Aware Security Behaviour Surveys
I Becker, S Parkin, MA Sasse
The {LASER} Workshop: Learning from Authoritative Security Experiment …, 2017
22017
A Passion for Security: Intervening to Help Software Developers
C Weir, I Becker, L Blair
2021 IEEE/ACM 43rd International Conference on Software Engineering …, 2021
2021
Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation
I Becker, R Posner, T Islam, P Ekblom, H Borrion, M McGuire, S Li
University of Hawaiʻi at Mānoa, 2021
2021
An analysis of perceptions and support for Windows 10 Home Edition update features
J Morris, I Becker, S Parkin
Journal of Cybersecurity 6 (1), tyaa017, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20