Masooda N Bashir

20112020
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2011 2020

2020

‘If you agree with me, do i trust you?’: An examination of human-agent trust from a psychological perspective

Huang, H. Y., Twidale, M. & Bashir, M., Jan 1 2020, Intelligent Systems and Applications - Proceedings of the 2019 Intelligent Systems Conference IntelliSys Volume 2. Bi, Y., Bhatia, R. & Kapoor, S. (eds.). Springer-Verlag, p. 994-1013 20 p. (Advances in Intelligent Systems and Computing; vol. 1038).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Design of experiments
Controllers
Experiments
2019

Human vs bots: Detecting human attacks in a honeypot environment

Udhani, S., Withers, A. & Bashir, M. N., Jun 2019, 7th International Symposium on Digital Forensics and Security, ISDFS 2019. Varol, A., Karabatak, M., Varol, C. & Teke, S. (eds.). Institute of Electrical and Electronics Engineers Inc., 8757534. (7th International Symposium on Digital Forensics and Security, ISDFS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Research Personnel

On the memorability of system-generated PINs: Can chunking help?

Huh, J. H., Kim, H., Bobba, R. B., Bashir, M. N. & Beznosov, K., Jan 1 2019, SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security. USENIX Association, p. 197-209 13 p. (SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Putting a price on social movements: A case study of #metoo on instagram

Afnan, T., Huang, H. Y., Sclafani, M. & Bashir, M., Jan 1 2019, In : Proceedings of the Association for Information Science and Technology. 56, 1, p. 1-9 9 p.

Research output: Contribution to journalArticle

social media
Social Movements
social movement
sexual violence
networking

Who Shares What with Whom? Information Sharing Preferences in the Online and Offline Worlds

Liu, C., Huang, H. Y., Albarracin, D. & Bashir, M. N., Jan 1 2019, Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, 2018. Ahram, T. Z. & Nicholson, D. (eds.). Springer-Verlag, p. 149-158 10 p. (Advances in Intelligent Systems and Computing; vol. 782).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Privacy and security of cardiovascular implantable electronic devices: Applying a contextual integrity analysis

Bloch, B. S. & Bashir, M., Jan 1 2018, Advances in Human Factors and Ergonomics in Healthcare and Medical Devices - Proceedings of the AHFE 2017 International Conferences on Human Factors and Ergonomics in Healthcare and Medical Devices, 2017. Duffy, V. & Lightner, N. (eds.). Springer-Verlag, p. 569-580 12 p. (Advances in Intelligent Systems and Computing; vol. 590).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Monitoring
Potential flow
Security systems

Ransomware: Recommendations against the extortion

Goel, S., Bambenek, J. & Bashir, M. N., Jan 1 2018, Proceedings of the 11th IADIS International Conference Information Systems 2018, IS 2018. Isaias, P., Nunes, M. B., Powell, P. & Rodrigues, L. (eds.). IADIS, p. 193-200 8 p. (Proceedings of the 11th IADIS International Conference Information Systems 2018, IS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Patents and inventions
Malware
Industry

Surfing safely: Examining older adults' online privacy protection behaviors

Huang, H. Y. & Bashir, M. N., Jan 1 2018, In : Proceedings of the Association for Information Science and Technology. 55, 1, p. 188-197 10 p.

Research output: Contribution to journalArticle

privacy
Internet
cognitive factors
technical development
threat

Users’ attitudes towards the “Going Dark” debate

Addawood, A., Zou, Y. & Bashir, M. N., Jan 1 2018, Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, 2017. Nicholson, D. (ed.). Springer-Verlag, p. 296-307 12 p. (Advances in Intelligent Systems and Computing; vol. 593).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

National security
Analysis of variance (ANOVA)

Users’ trust in automation: A cultural perspective

Huang, H. Y. & Bashir, M. N., Jan 1 2018, Advances in Human Factors in Robots and Unmanned Systems - Proceedings of the AHFE 2017 International Conference on Human Factors in Robots and Unmanned Systems, 2017. Chen, J. (ed.). Springer-Verlag, p. 282-289 8 p. (Advances in Intelligent Systems and Computing; vol. 595).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automation
Regression analysis
Artificial intelligence
2017

Android app permission and users’ adoption: A case study of mental health application

Huang, H. Y. & Bashir, M., Jan 1 2017, Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017 Held as Part of HCI International 2017, Proceedings. Tryfonas, T. (ed.). Springer-Verlag, p. 110-122 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10292 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Anxiety
Privacy
Mobile Devices
Mobile devices

Cloud security certifications: A comparison to improve cloud service provider security

Di Giulio, C., Sprabery, R., Kamhoua, C., Kwiat, K., Campbell, R. H. & Bashir, M. N., Mar 22 2017, Proceedings of the 2nd International Conference on Internet of Things and Cloud Computing, ICC 2017. Hamdan, H., Boubiche, D. E. & Hidoussi, F. (eds.). Association for Computing Machinery, a120. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Security of data
Standardization

Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security?

Giulio, C. D., Sprabery, R., Kamhoua, C., Kwiat, K., Campbell, R. H. & Bashir, M. N., Sep 8 2017, Proceedings - 2017 IEEE 10th International Conference on Cloud Computing, CLOUD 2017. Fox, G. C. (ed.). IEEE Computer Society, p. 50-57 8 p. 8030571. (IEEE International Conference on Cloud Computing, CLOUD; vol. 2017-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Information technology

IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers

Giulio, C. D., Sprabery, R., Kamhoua, C., Kwiat, K., Campbell, R. & Bashir, M. N., Jul 10 2017, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. Institute of Electrical and Electronics Engineers Inc., p. 1090-1099 10 p. 7973818. (Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information technology
Cloud computing
Redundancy
Information systems

Personal influences on dynamic trust formation in human-agent interaction

Huang, H. Y. & Bashir, M., Oct 17 2017, HAI 2017 - Proceedings of the 5th International Conference on Human Agent Interaction. Association for Computing Machinery, Inc, p. 233-243 11 p. (HAI 2017 - Proceedings of the 5th International Conference on Human Agent Interaction).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human engineering
Automation
Controllers
Experiments

Privacy by region: Evaluation online users' privacy perceptions by geographical region

Huang, H. Y. & Bashir, M. N., Jan 17 2017, FTC 2016 - Proceedings of Future Technologies Conference. Institute of Electrical and Electronics Engineers Inc., p. 968-977 10 p. 7821721. (FTC 2016 - Proceedings of Future Technologies Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Geographical regions
privacy
Systems analysis
evaluation
regional difference
self-efficacy
Decision making
decision making
career
hacker

Stance classification of Twitter debates: The encryption debate as a use case

Addawood, A., Schneider, J. & Bashir, M., Jul 28 2017, 8th International Conference on Social Media and Society: Social Media for Good or Evil, #SMSociety 2017. Association for Computing Machinery, 3097288. (ACM International Conference Proceeding Series; vol. Part F129683).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
National security
Syntactics
Learning systems
2016

A comprehensive empirical study of data privacy, trust, and consumer autonomy

Kesan, J. P., Hayes, C. M. & Bashir, M. N., Jan 1 2016, In : Indiana Law Journal. 91, 2, p. 267-352 86 p.

Research output: Contribution to journalReview article

privacy
autonomy
privacy law
private sector
data storage

The onion router: Understanding a privacy enhancing technology community

Huang, H. Y. & Bashir, M., Jan 1 2016, In : Proceedings of the Association for Information Science and Technology. 53, 1, p. 1-10 10 p.

Research output: Contribution to journalArticle

Routers
privacy
community
Data privacy
Law enforcement

Understanding the personality characteristics of cybersecurity competition participants to improve the effectiveness of competitions as recruitment tools

Wee, C. & Bashir, M., Jan 1 2016, Advances in Human Factors in Cybersecurity - Proceedings of the AHFE International Conference on Human Factors in Cybersecurity, 2016. Nicholson, D. (ed.). Springer-Verlag, p. 111-121 11 p. (Advances in Intelligent Systems and Computing; vol. 501).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision making

Users' perspective on designing inclusive privacy-enhancing indicators

Huang, H. Y. & Bashir, M., Jan 1 2016, 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016. Institute of Electrical and Electronics Engineers Inc., p. 600-607 8 p. 7906993. (2016 14th Annual Conference on Privacy, Security and Trust, PST 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

privacy
Information technology
Systems analysis
Internet
invasion

Users’ privacy perceptions about wearable technology: Examining influence of personality, trust, and usability

Lamb, K., Huang, H. Y., Marturano, A. & Bashir, M., Jan 1 2016, Advances in Human Factors in Cybersecurity - Proceedings of the AHFE International Conference on Human Factors in Cybersecurity, 2016. Nicholson, D. (ed.). Springer-Verlag, p. 55-68 14 p. (Advances in Intelligent Systems and Computing; vol. 501).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Wearable technology

What motivates people to use Bitcoin?

Bashir, M., Strickland, B. & Bohr, J., Jan 1 2016, Social Informatics - 8th International Conference, SocInfo 2016, Proceedings. Ahn, Y-Y. & Spiro, E. (eds.). Springer-Verlag, p. 347-367 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10047 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Currency
Peer to peer networks
Social Structure
Alike
Peer-to-peer Networks
2015

Cybersecurity Competitions: The Human Angle

Bashir, M., Lambert, A., Guo, B., Memon, N. & Halevi, T., Sep 1 2015, In : IEEE Security and Privacy. 13, 5, p. 74-79 6 p., 7310819.

Research output: Contribution to journalShort survey

career
Students
event
student

Digital forensics education: A multidisciplinary curriculum model

Palmer, I., Wood, E., Nagy, S., Garcia, G., Bashir, M. & Campbell, R., Jan 1 2015, Digital Forensics and Cyber Crime - 7th International Conference, ICDF2C 2015, Revised Selected Papers. Breitinger, F. & James, J. I. (eds.). Springer-Verlag, p. 3-15 13 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 157).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Curricula
Education
Students
Digital forensics

Direct-to-Consumer genetic testing: Contextual privacy predicament

Huang, H. Y. & Bashir, M., Jan 1 2015, In : Proceedings of the Association for Information Science and Technology. 52, 1, p. 1-10 10 p.

Research output: Contribution to journalArticle

privacy
Testing
Genes
Health
vulnerability

Examining the gender gap in information assurance: A study of psychological factors

Huang, H. Y. & Bashir, M., Jan 1 2015, HCI International 2015 – Posters Extended Abstracts - International Conference, HCI International 2015, Proceedings. Stephanidis, C. (ed.). Springer-Verlag, p. 117-122 6 p. (Communications in Computer and Information Science; vol. 528).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Exploring the effectiveness of digital forensics tools on the Sony PlayStation Vita

Alvarez, K. & Bashir, M., Jan 1 2015, Digital Forensics and Cyber Crime - 7th International Conference, ICDF2C 2015, Revised Selected Papers. Breitinger, F. & James, J. I. (eds.). Springer-Verlag, p. 200-206 7 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 157).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metadata
Digital forensics

Is privacy a human right? An empirical examination in a global context

Huang, H. Y. & Bashir, M., Aug 31 2015, 2015 13th Annual Conference on Privacy, Security and Trust, PST 2015. Hisil, H., Ghorbani, A., Garcia-Alfaro, J., Koltuksuz, A., Torra, V., Zhang, J., Sensoy, M., Zincir, I. & Miri, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 77-84 8 p. 7232957. (2015 13th Annual Conference on Privacy, Security and Trust, PST 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Concretes

Library patron privacy in jeopardy an analysis of the privacy policies of digital content vendors

Lambert, A. D., Parker, M. & Bashir, M., Jan 1 2015, In : Proceedings of the Association for Information Science and Technology. 52, 1, p. 1-9 9 p.

Research output: Contribution to journalArticle

privacy
industry
community
Industry
content analysis

Online privacy and informed consent: The dilemma of information asymmetry

Bashir, M., Hayes, C., Lambert, A. D. & Kesan, J. P., Jan 1 2015, In : Proceedings of the Association for Information Science and Technology. 52, 1, p. 1-10 10 p.

Research output: Contribution to journalArticle

Internet service providers
asymmetry
privacy
Internet
voluntariness

Quantitative security metrics with human in the loop

Noureddine, M., Keefe, K., Sanders, W. H. & Bashir, M., Apr 21 2015, Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015. Association for Computing Machinery, 2746215. (ACM International Conference Proceeding Series; vol. 21-22-April-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Human engineering
Uncertainty

Trust in automation: Integrating empirical evidence on factors that influence trust

Hoff, K. A. & Bashir, M., May 23 2015, In : Human Factors. 57, 3, p. 407-434 28 p.

Research output: Contribution to journalArticle

Automation
automation
evidence
empirical research
Empirical Research
2014

Are Bitcoin Users Less Sociable? An Analysis of Users' Language and Social Connections on Twitter

Hernandez, I., Bashir, M. N., Jeon, G. & Bohr, J., Jan 1 2014, In : Communications in Computer and Information Science. 435 PART II, p. 26-31 6 p.

Research output: Contribution to journalArticle

Currency
Likely
Social Networking
Peer to Peer
Language

Developing a new digital forensics curriculum

Lang, A., Bashir, M. N., Campbell, R. H. & DeStefano, L., 2014, p. S76-S84.

Research output: Contribution to conferencePaper

Curricula
Social sciences
Digital forensics
Computer science
Teaching

Developing a new digital forensics curriculum

Lang, A., Bashir, M. N., Campbell, R. H. & Destefano, L., Aug 2014, In : Digital Investigation. 11, SUPPL. 2

Research output: Contribution to journalArticle

Open Access
Curriculum
Curricula
curriculum
advanced course
Social Psychology

Who Uses Bitcoin? An exploration of the Bitcoin community

Bohr, J. & Bashir, M. N., Jan 1 2014, 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014. Miri, A., Josang, A., Garcia-Alfaro, J., Hengartner, U. & Huang, N-F. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 94-101 8 p. 6890928. (2014 12th Annual Conference on Privacy, Security and Trust, PST 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic money
2013

A Theoretical Model for Trust in Automated Systems

Bashir, M. N. & Hoff, K., Apr 27 2013, CHI EA 2013 - Extended Abstracts on Human Factors in Computing Systems: Changing Perspectives. Beaudouin-Lafon, M., Baudisch, P. & Mackay, W. E. (eds.). Association for Computing Machinery, p. 115-120 6 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2013-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automation

Information Privacy and Data Control in Cloud Computing: Consumers, Privacy Preferences, and Market Efficiency.

Kesan, J. P., Hayes, C. M. & Bashir, M. N., Jan 1 2013, In : Washington & Lee Law Review. 70, 1, p. 341-472 132 p.

Research output: Contribution to journalArticle

Privacy
Computer Security
Civil Rights
Cloud Computing
Consumer Behavior
2012

Does profiling make us more secure?

Pfleeger, S. L., Rogers, M., Bashir, M. N., Caine, K., Caputo, D., Losavio, M. & Stolfo, S., Aug 30 2012, In : IEEE Security and Privacy. 10, 4, p. 10-15 6 p., 6265096.

Research output: Contribution to journalArticle

Group
2011

Privacy in the cloud: Going beyond the contractarian paradigm

Bashir, M. N., Kesan, J. P., Hayes, C. M. & Zielinski, R., 2011, Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies, GTIP'11. p. 21-27 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Internet
Security of data
Innovation
Communication