Angela Sasse
#57,076
Most Influential Person Now
Computer scientist and information security expert
Angela Sasse's AcademicInfluence.com Rankings
Angela Sassecomputer-science Degrees
Computer Science
#4736
World Rank
#5001
Historical Rank
Information Security
#20
World Rank
#20
Historical Rank
Database
#5165
World Rank
#5365
Historical Rank
Download Badge
Computer Science
Why Is Angela Sasse Influential?
(Suggest an Edit or Addition)According to Wikipedia, Martina Angela Sasse is a German psychologist whose research spans the areas of human–computer interaction and computer security. She is Horst Görtz Endowed Professor of Human-Centred Security at Ruhr University Bochum. and has a part-time position as Professor of Human-Centred Technology at University College London.
Angela Sasse's Published Works
Published Works
- Users are not the enemy (1999) (1490)
- Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security (2001) (744)
- Are Passfaces More Usable Than Passwords? A Field Trial Investigation (2000) (476)
- The mechanics of trust: A framework for research and design (2005) (455)
- "Stuff goes into the computer and doesn't come out": a cross-tool study of personal information management (2004) (442)
- The impact of avatar realism and eye gaze control on perceived quality of communication in a shared immersive virtual environment (2003) (411)
- The true cost of unusable password policies: password use in the wild (2010) (382)
- The impact of eye gaze on communication using humanoid avatars (2001) (317)
- The compliance budget: managing security behaviour in organisations (2009) (296)
- Measuring perceived quality of speech and video in multimedia conferencing applications (1998) (238)
- Sharp or smooth?: comparing the effects of quantization vs. frame rate for streamed video (2004) (219)
- Pretty good persuasion: a first step towards effective password security in the real world (2001) (203)
- Shiny happy people building trust?: photos on e-commerce websites and consumer trust (2003) (200)
- Making Passwords Secure and Usable (1997) (196)
- The researcher's dilemma: evaluating trust in computer-mediated communication (2003) (190)
- ’Knowing me, knowing you’ — Using profiles and social networking to improve recommender systems (2006) (180)
- Successful multiparty audio communication over the Internet (1998) (160)
- Privacy in Multimedia Communications: Protecting Users, Not Just Data (2001) (150)
- Why users compromise computer security mechanisms and how to take remedial measures. (1999) (140)
- Usable Security: Why Do We Need It? How Do We Get It? (2005) (137)
- Security Education against Phishing: A Modest Proposal for a Major Rethink (2012) (127)
- Do Users Always Know What's Good For Them? Utilising Physiological Responses to Assess Media Quality (2000) (125)
- Obstacles to the Adoption of Secure Communication Tools (2017) (124)
- Bringing security home: a process for developing secure and usable systems (2003) (123)
- Evaluating Audio and Video Quality in Low-Cost Multimedia Conferencing Systems (1996) (109)
- Integrating security and usability into the requirements and design process (2007) (106)
- Could I have the Menu Please? An Eye Tracking Study of Design Conventions (2004) (101)
- Reliable Audio for Use over the Internet (2006) (97)
- Eliciting and describing users' models of computer systems (1997) (96)
- Of packets and people: a user-centered approach to quality of service (2000) (90)
- Safe and sound: a safety-critical approach to security (2001) (87)
- Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising (2012) (85)
- “Ten strikes and you're out”: Increasing the number of login attempts can improve password usability (2003) (81)
- Too Many Hierarchies? The Daily Struggle for Control of the Workspace (2003) (80)
- Accounting for taste: using profile similarity to improve recommender systems (2006) (80)
- From Weakest Link to Security Hero: Transforming Staff Security Behavior (2014) (79)
- Trustbuilders and Trustbusters - The Role of Trust Cues in Interfaces to e-Commerce Applications (2001) (79)
- "They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking (2015) (77)
- The Eyes Never Lie: The Use of Eyetracking Data in HCI Research (2002) (76)
- Learning from "Shadow Security": Why understanding non-compliant behaviors provides the basis for effective security (2014) (75)
- CISOs and organisational culture: Their own worst enemy? (2013) (75)
- Don't work. Can't work? Why it's time to rethink security warnings (2012) (75)
- Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery (2003) (72)
- Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie? (1999) (70)
- Multimedia Conferencing via Multicast: Determining the Quality of Service Required by the End User (1997) (66)
- "Comply or Die" Is Dead: Long Live Security-Aware Principal Agents (2013) (64)
- “Not the Usual Suspects”: A study of factors reducing the effectiveness of CCTV (2008) (63)
- Investigating the impact of audio degradations on users: subjective vs objective assessment methods (2000) (58)
- Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems (2005) (54)
- How to t(r)ap user's mental models (1989) (54)
- Usability and Trust in Information Systems (2005) (53)
- Taming the wolf in sheep's clothing: privacy in multimedia communications (1999) (53)
- Face it - photos don't make a web site trustworthy (2002) (48)
- A stealth approach to usable security: helping IT security managers to identify workable security solutions (2010) (48)
- Evaluating the usability and security of a graphical one-time PIN system (2010) (48)
- Scaring and Bullying People into Security Won't Work (2015) (48)
- "Shadow security" as a tool for the learning organization (2015) (47)
- Remote Seminars through Multimedia Conferencing: Experiences from the MICE project (1994) (47)
- "Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure (2013) (47)
- Expressions of expertness: the virtuous circle of natural language for access control policy specification (2008) (46)
- Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems (2007) (46)
- Desperately seeking assurances: Segmenting users by their information-seeking preferences (2014) (46)
- From doing to being: getting closer to the user experience (2004) (45)
- Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr (2018) (45)
- Towards Robust Experimental Design for User Studies in Security and Privacy (2016) (44)
- Barriers to Usable Security? Three Organizational Case Studies (2016) (44)
- It ain't what you charge, it's the way that you do it: a user perspective of network QoS and pricing (1999) (42)
- What Usable Security Really Means: Trusting and Engaging Users (2014) (40)
- Can we ID from CCTV? Image quality in digital CCTV and face identification performance (2008) (37)
- ‘R‐What?’ Development of a role‐based access control policy‐writing tool for e‐Scientists (2005) (36)
- Debunking Security-Usability Tradeoff Myths (2016) (35)
- Multimedia Integrated Conferencing for European Researchers (MICE): Piloting Activities and the Conference Management and Multiplexing Centre (1993) (35)
- Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours (2016) (35)
- Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science (2009) (35)
- The good, the bad, and the muffled: the impact of different degradations on Internet speech (2000) (34)
- Listen to Your Heart Rate: Counting the Cost of Media Quality (1999) (34)
- NETWORK QUALITY OF SERVICE: WHAT DO USERS NEED? (1999) (33)
- Privacy is a process, not a PET: a theory for effective privacy practice (2012) (33)
- Permissions snapshots: Assessing users' adaptation to the Android runtime permission model (2016) (32)
- Human vulnerabilities in security systems (2007) (31)
- Man or a Gorilla? Performance Issues with CCTV Technology in Security Control Rooms (2006) (31)
- The Great Authentication Fatigue - And How to Overcome It (2014) (31)
- Conceptual Design Reconsidered: The Case of the Internet Session Directory Tool (1997) (27)
- The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram (2017) (27)
- Employee Rule Breakers, Excuse Makers and Security Champions:: Mapping the risk perceptions and emotions that drive security behaviors (2015) (27)
- Why Value Is Everything: A User-Centered Approach to Internet Quality of Service and Pricing (2001) (26)
- Support for collaborative authoring via Email: the MESSIE environment (1993) (26)
- to catch a thief -- you need at least 8 frames per second: the impact of frame rates on user performance in a CCTV detection task (2008) (26)
- How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization (2012) (24)
- Rich Media, Poor Judgement? A Study of Media Effects on Users' Trust in Expertise (2005) (24)
- Finding Security Champions in Blends of Organisational Culture (2017) (23)
- Better the Devil You Know: A User Study of Two CAPTCHAs and a Possible Replacement (2016) (22)
- Why Trust Seals Don't Work: A Study of User Perceptions and Behavior (2012) (22)
- A 3-dimensional approach to assessing end-user quality of service (2001) (21)
- Usability is the best policy: public policy and the lived experience of transport systems in London (2007) (20)
- "I thought it was terrible and everyone else loved it" - A New Perspective for Effective Recommender System Design (2005) (20)
- Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider (2012) (19)
- Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application (2012) (19)
- Eye-Catcher of Blind Spot? The Effect of Photographs of Faces on eCommerce Sites (2002) (19)
- ‘ R-Whatq ’ Development of a role-based access control policy-writing tool for e-Scientists: Research Articles (2005) (18)
- Interventions for long‐term software security: Creating a lightweight program of assurance techniques for developers (2019) (18)
- From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design (2017) (18)
- People and computers XI : proceedings of HCI '96 (1996) (17)
- Designing a large-scale video chat application (2005) (17)
- The head or the heart?: measuring the impact of media quality (2000) (16)
- Straight from the heart: using physiological measurements in the evaluation of multimedia quality (2001) (16)
- Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption (2018) (15)
- Do people trust their eyes more than ears?: media bias in detecting cues of expertise (2005) (15)
- Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication (2011) (15)
- Applying Cognitive Control Modes to Identify Security Fatigue Hotspots (2016) (14)
- Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions (2016) (14)
- The SAFETRIP Project: improving road safety for passenger vehicles using 2-way satellite communications (2010) (14)
- Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers (2019) (13)
- GazeSpace: eye gaze controlled content spaces (2007) (12)
- International comparison of bank fraud reimbursement: customer perceptions and contractual terms (2016) (12)
- "Technology Should Be Smarter Than This!": A Vision for Overcoming the Great Authentication Fatigue (2013) (12)
- Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens (2016) (11)
- Life Beyond the Mailbox: A Cross-Tool Perspective on Personal Information Management (2002) (11)
- ReLaTe: Remote Language Teaching over SuperJANET (1995) (11)
- Ignore These At Your Peril: Ten principles for trust design (2010) (11)
- Security When it is Welcome: Exploring Device Purchase as an Opportune Moment for Security Behavior Change (2019) (11)
- The Security-Usability Tradeoff Myth (2016) (10)
- Distance education via IP videoconferencing: results from a national pilot project (2000) (10)
- When did my mobile turn into a 'sellphone'?: a study of consumer responses to tailored smartphone ads (2012) (10)
- Light-Touch Interventions to Improve Software Development Security (2018) (10)
- "I don't like putting my face on the Internet!": An acceptance study of face biometrics as a CAPTCHA replacement (2016) (10)
- The devil you know knows best: how online recommendations can benefit from social networking (2007) (10)
- Trust at First Sight? A Test of Users’ Ability to Identify Trustworthy E-commerce Sites (2004) (10)
- Eliciting and modelling expertise for serious games in project management (2011) (10)
- Designing E-Commerce Applications for Consumer Trust (2003) (10)
- Eye-Catcher or Blind Spot? (2003) (10)
- Fixing Security Together: Leveraging trust relationships to improve security in organizations (2015) (10)
- Gathering realistic authentication performance data through field trials (2010) (10)
- Examining Users' Repertoire of Internet Applications (1999) (10)
- A framework for the lived experience of identity (2010) (10)
- The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength (2018) (9)
- "The devil you know knows best": how online recommendations can benefit from social networking (2007) (9)
- Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces (2016) (9)
- People and Computers XI (1996) (9)
- The ETNA Taxonomy (2002) (8)
- Trusting to Learn: Trust and Privacy Issues in Serious Games (2011) (8)
- How Web browsers shape users' understanding of networks (2000) (8)
- The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan (2018) (8)
- The Security-Usability Tradeoff Myth [Guest editors' introduction] (2016) (8)
- Studying users' adaptation to Android's run-time fine-grained access control system (2018) (8)
- Poster : Mental Models – User understanding of messaging and encryption (2016) (8)
- Dead on Arrival: Recovering from Fatal Flaws in Email Encryption Tools (2017) (8)
- Assessing the User Experience of Password Reset Policies in a University (2015) (8)
- Data after death: User requirements and design challenges for SNSs and email providers (2012) (8)
- Usable biometrics for an ageing population (2013) (8)
- Adding insult to injury: consumer experiences of being denied credit (2012) (8)
- 2 Fast 2 Secure: A Case Study of Post-Breach Security Changes (2019) (8)
- "No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones (2017) (7)
- Back to basics: is a better understanding of the Internet a precursor for effective use of the web? (2000) (7)
- Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback (2014) (7)
- Do People Trust Their Eyes More Than Their Ears? Media Bias While Seeking Expert Advice (2005) (7)
- Why Jenny can't figure out which of these messages is a covert information operation (2019) (7)
- Support for Collaborative Authoring via Electronic Mail: The MESSIE Environment (1993) (7)
- Factors influencing users to use unsecured wi-fi networks: evidence in the wild (2019) (7)
- Designing acceptable user registration processes for e-services (2012) (7)
- The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions (2016) (7)
- The Geometry of Web Search (2004) (7)
- Do you know dis?: a user study of a knowledge discovery tool for organizations (2011) (7)
- Studying Password Use in the Wild: Practical Problems and Possible Solutions (2010) (7)
- Guiding decisions on authorization policies: a participatory approach to decision support (2012) (7)
- "Too Taxing on the Mind!" Authentication Grids are not for Everyone (2015) (7)
- Coping with Complexity and Interference: Design Issues in Multimedia Conferencing Systems (1994) (7)
- Socio-Technical Security Metrics (Dagstuhl Seminar 14491) (2015) (6)
- Internet Multimedia Conferencing - Results from the ReLaTe Project (1997) (6)
- Information security as organizational power: A framework for re-thinking security policies (2011) (6)
- Attributes affecting user decision to adopt a Virtual Private Network (VPN) app (2020) (6)
- Federated identity to access e-government services: are citizens ready for this? (2013) (6)
- Usability is a policy issue: Minimising the "Hassle Factor" in mobile payment of the Central London Congestion Charge (2005) (6)
- Design for trusted and trustworthy services: Why we must do better (2012) (6)
- Learning from Others' Mistakes Through Computer Supported Vicarious Learning (2003) (5)
- Proceedings of HCI on People and Computers XI (1996) (5)
- Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations (2016) (5)
- Context-based Personalised Settings for Mobile Location Sharing (2011) (5)
- Commercial uses of eye tracking (2005) (5)
- Support for authoring and managing web-based coursework: the TACO Project (1998) (5)
- Analysing Simulated Phishing Campaigns for Staff (2020) (5)
- Helping You Protect You (2014) (5)
- 'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312) (2013) (5)
- Security Education against Phishing (2012) (5)
- Unlocking the Next Level of Crime Prevention: Development of a Game Prototype to Teach the Conjuncti (2012) (4)
- Investigating loan applicants' perceptions of alternative data items and the effect of incentives on disclosure (2011) (4)
- Situating the transient user: overcoming challenges in the design of e-government systems (2005) (4)
- CHI 2003 Workshop on Human-Computer Interaction and Security Systems, Fort Lauderdale (2003) (4)
- Exploring blog spaces: a study of blog reading experiences using dynamic contextual displays (2009) (4)
- Privacy for Loan Applicants Versus Predictive Power for Loan Providers: Is It Possible to Bridge the Gap? (2012) (4)
- Eliciting and modelling expertise for serious game design (2010) (4)
- Designing QoS and Charging Mechanisms: He who pays the service shapes the design (2001) (4)
- Designing and evaluating usable security and privacy technology (2009) (4)
- The Role of Trust Cues in Interfaces to e-Commerce Applications (2001) (3)
- Peeking Into the Black Box: Towards Understanding User Understanding of E2EE (2021) (3)
- Towards a Simulation of Information Security Behaviour in Organisations (2014) (3)
- Measuring the Success of Context-Aware Security Behaviour Surveys (2017) (3)
- Computer Support for Vicarious Learning (2002) (3)
- Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent (2013) (3)
- Depending on the Kindness of Strangers ? Trust Relationships in Ambient Societies (2004) (3)
- Educational Metadata: Friendly Fire? (2002) (3)
- Weak at the knees? Arthroscopic surgery simulation user requirements, capturing the psychological impact of VR innovation through risk-based design (1999) (3)
- Contextualizing the blogosphere: a comparison of traditional and novel user interfaces for the web (2007) (3)
- Individual and organizational perspectives on data use in serious games (2011) (3)
- Are Payment Card Contracts Unfair? (Short Paper) (2016) (3)
- Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF) (2017) (2)
- POSTER: Secure Chat for the Masses? User-centered Security to the Rescue (2015) (2)
- There's Trouble in Paradise: Problems with Educational Metadata Encountered during the MALTED Project (2001) (2)
- Microsoft Office Macro Warnings:A Design Comedy of Errors with Tragic Security Consequences (2021) (2)
- Protecting You (2014) (2)
- Human-computer interaction : INTERACT '99 : IFIP TC.13 International Conference on Human-Computer Interaction, 30th August-3rd September 1999, Edinburgh, UK (1999) (2)
- In Search for the Right Measure (2014) (2)
- Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling (2011) (2)
- Design to Instruct: Lessons for Training Through Involving Teachers in Design (1998) (2)
- Personalised Focus-Metaphor Interfaces: An Eye Tracking Study on User Confusion (2006) (2)
- Persuading giants to be wise: an exploratory study of advice sharing in online games (2010) (2)
- Expressions of Expertness : (2008) (2)
- Piloting IP multicast conferencing over SuperJANET: the PIPVIC Project (1998) (1)
- Manuscript : Trust in Mediated Interactions Oxford Handbook of Internet Psychology (2007) (1)
- Educational metadata - friend or foe? (2001) (1)
- Phishing for Awareness (2020) (1)
- Learning from “ Shadow Security : ” Why nderstanding on-ompliant ehaviors rovides the asis for ffective ecurity (2014) (1)
- Multimedia Integrated Conferencing For European Researchers: Experiences Form The Mice Project (1994) (1)
- Human-Computer Interaction INTERACT '99: IFIP TC. 13 - 1999 Edinburgh (1999) (1)
- Navigating Haystacks at 70 mph: Intelligent Search for Intelligent In-Car Services (2011) (1)
- Book Review: "Cognitive Ergonomics and Human-Computer Interaction, " edited by J. Long and A. Whitefield (1991) (1)
- Privacy in collaborative multimedia environments (2001) (1)
- International Research Seminars through Multimedia Conferencing: Experiences from the MICE project (1994) (1)
- Pre-publication version of USERS ARE NOT THE ENEMY CACM 1999 (2014) (0)
- Policy and Power A framework for re-thinking information security (2011) (0)
- The Internet was once perceived as a computer network used by researchers to transfer files and send text messages. Today, more users are becoming aware of its potential as a general communication network. (1998) (0)
- 2 14491 – Socio-Technical Security Metrics 1 Executive Summary (2015) (0)
- Not all bits have equal value: investigating users' network QoS requirements (2001) (0)
- Human-computer interaction INTERAGT '99 - IFIP TC.13 International Conference on Human-Computer Interaction, 30th August-3rd September 1999, Edinburgh, UK - Editors' preface: A perspective on failure (1999) (0)
- Contemporary ergonomics 1984-2008 : selected papers and an overview of the Ergonomics Society annual conference (2009) (0)
- Relate (remote Language Teaching over Superjanet) Was a Bt/jisc Funded Superjanet Applications Project From (2007) (0)
- Human-centred identity - from rhetoric to reality (2010) (0)
- Deception in Online Auction Marketplaces: Incentives and Personality Shape Seller Honesty (2015) (0)
- Designing National Identity: An Organisational Perspective on Requirements for National Identity Management Systems (2012) (0)
- New Security Paradigms Workshop (nspw 2010) Why Is There No Science in Cyber Science? (first Part) (2010) (0)
- Final Report : Evaluation Taxonomy for Networked Multimedia Systems ( ETNA ) (2002) (0)
- The ETNA Taxonomy The ETNA Taxonomy (2002) (0)
- Conducting audio and video quality assessment based on HCI evaluation principles (2001) (0)
- Unraveling Around Explicit HIV Status Disclosure Fields in the Online (2018) (0)
- Preface: "HCI... but not as we know it" (2007) (0)
- Messages From A Tangled Web (2006) (0)
- Proceedings of HCI 2007 - Index (2007) (0)
- THE CASE FOR ADAPTING SAFETY MODELS FOR SECURITY 3 . 1 Similar ities Between Safety and Secur ity Domains (2001) (0)
- From Corporate Bully to Security Cheerleader: Transforming the Identity of the CISO (2012) (0)
- Writing Security Policies in Natural Language (2009) (0)
- Workstation-based multimedia conferencing: Experiences from the MICE project (1994) (0)
- The Impact of Authorization Problems on Individuals and the Organization 24 / 05 / 2012 (2012) (0)
- Comment and analysis: Angela Sasse on the vulnerability of biometric security (2008) (0)
- Is sending shops ads by Bluetooth just a bit creepy (2014) (0)
This paper list is powered by the following services:
Other Resources About Angela Sasse
What Schools Are Affiliated With Angela Sasse?
Angela Sasse is affiliated with the following schools: