Rick Wash
Title
Cited by
Cited by
Year
Student use of Facebook for organizing collaborative classroom activities
C Lampe, DY Wohn, J Vitak, NB Ellison, R Wash
International Journal of Computer-Supported Collaborative Learning 6 (3 …, 2011
4582011
Motivations to participate in online communities
C Lampe, R Wash, A Velasquez, E Ozkaya
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2010
4102010
Folk models of home computer security
R Wash
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-16, 2010
3632010
Understanding password choices: How frequently entered passwords are re-used across websites
R Wash, E Rader, R Berman, Z Wellmer
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 175-188, 2016
1452016
The S in Social Network Games: Initiating, Maintaining, and Enhancing Relationships
DY Wohn, C Lampe, R Wash, N Ellison, J Vitak
2011 44th Hawaii International Conference on System Sciences (HICSS),, 1-10, 2011
1402011
Stories as informal lessons about security
E Rader, R Wash, B Brooks
Proceedings of the Eighth Symposium on Usable Privacy and Security, 1-17, 2012
1342012
Coordinating donors on crowdfunding websites
R Wash, J Solomon
Proceedings of the 17th ACM conference on Computer supported cooperative …, 2014
126*2014
Betrayed by updates: how negative experiences affect future security
KE Vaniea, E Rader, R Wash
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1162014
The value of completing crowdfunding projects
R Wash
Seventh International AAAI Conference on Weblogs and Social Media, 2013
1162013
Too much knowledge? security beliefs and protective behaviors among united states internet users
R Wash, E Rader
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 309-325, 2015
952015
Don't wait! How timing affects coordination of crowdfunding donations
J Solomon, W Ma, R Wash
Proceedings of the 18th acm conference on computer supported cooperative …, 2015
922015
Out of the loop: How automated software updates cause unintended security consequences
R Wash, E Rader, K Vaniea, M Rizor
10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 89-104, 2014
762014
Influencing mental models of security: a research agenda
R Wash, E Rader
Proceedings of the 2011 New Security Paradigms Workshop, 57-66, 2011
762011
The future of Internet worms
J Nazario, J Anderson, R Wash, C Connelly
In Black Hat USA, 2001
752001
Influences on tag choices in del. icio. us
E Rader, R Wash
Proceedings of the 2008 ACM conference on Computer supported cooperative …, 2008
712008
Identifying patterns in informal sources of security information
E Rader, R Wash
Journal of Cybersecurity 1 (1), 121-144, 2015
672015
Public bookmarks and private benefits: An analysis of incentives in social computing
R Wash, E Rader
Proceedings of the American Society for Information Science and Technology …, 2007
572007
Who provides phishing training? facts, stories, and people like me
R Wash, MM Cooper
Proceedings of the 2018 chi conference on human factors in computing systems …, 2018
532018
An economic response to unsolicited communication
T Loder, M Van Alstyne, R Wash
Advances in Economic Analysis and Policy 6 (1), 2006
532006
Design decisions in the RideNow project
R Wash, L Hemphill, P Resnick
Proceedings of the 2005 international ACM SIGGROUP conference on Supporting …, 2005
472005
The system can't perform the operation now. Try again later.
Articles 1–20