Masooda N Bashir

20112020
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2011 2020

Filter
Conference contribution
2020

‘If you agree with me, do i trust you?’: An examination of human-agent trust from a psychological perspective

Huang, H. Y., Twidale, M. & Bashir, M., Jan 1 2020, Intelligent Systems and Applications - Proceedings of the 2019 Intelligent Systems Conference IntelliSys Volume 2. Bi, Y., Bhatia, R. & Kapoor, S. (eds.). Springer-Verlag, p. 994-1013 20 p. (Advances in Intelligent Systems and Computing; vol. 1038).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Design of experiments
Controllers
Experiments
2019

Human vs bots: Detecting human attacks in a honeypot environment

Udhani, S., Withers, A. & Bashir, M. N., Jun 2019, 7th International Symposium on Digital Forensics and Security, ISDFS 2019. Varol, A., Karabatak, M., Varol, C. & Teke, S. (eds.). Institute of Electrical and Electronics Engineers Inc., 8757534. (7th International Symposium on Digital Forensics and Security, ISDFS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Research Personnel

On the memorability of system-generated PINs: Can chunking help?

Huh, J. H., Kim, H., Bobba, R. B., Bashir, M. N. & Beznosov, K., Jan 1 2019, SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security. USENIX Association, p. 197-209 13 p. (SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Who Shares What with Whom? Information Sharing Preferences in the Online and Offline Worlds

Liu, C., Huang, H. Y., Albarracin, D. & Bashir, M. N., Jan 1 2019, Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, 2018. Ahram, T. Z. & Nicholson, D. (eds.). Springer-Verlag, p. 149-158 10 p. (Advances in Intelligent Systems and Computing; vol. 782).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Privacy and security of cardiovascular implantable electronic devices: Applying a contextual integrity analysis

Bloch, B. S. & Bashir, M., Jan 1 2018, Advances in Human Factors and Ergonomics in Healthcare and Medical Devices - Proceedings of the AHFE 2017 International Conferences on Human Factors and Ergonomics in Healthcare and Medical Devices, 2017. Duffy, V. & Lightner, N. (eds.). Springer-Verlag, p. 569-580 12 p. (Advances in Intelligent Systems and Computing; vol. 590).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Monitoring
Potential flow
Security systems

Ransomware: Recommendations against the extortion

Goel, S., Bambenek, J. & Bashir, M. N., Jan 1 2018, Proceedings of the 11th IADIS International Conference Information Systems 2018, IS 2018. Isaias, P., Nunes, M. B., Powell, P. & Rodrigues, L. (eds.). IADIS, p. 193-200 8 p. (Proceedings of the 11th IADIS International Conference Information Systems 2018, IS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Patents and inventions
Malware
Industry

Users’ attitudes towards the “Going Dark” debate

Addawood, A., Zou, Y. & Bashir, M. N., Jan 1 2018, Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, 2017. Nicholson, D. (ed.). Springer-Verlag, p. 296-307 12 p. (Advances in Intelligent Systems and Computing; vol. 593).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

National security
Analysis of variance (ANOVA)

Users’ trust in automation: A cultural perspective

Huang, H. Y. & Bashir, M. N., Jan 1 2018, Advances in Human Factors in Robots and Unmanned Systems - Proceedings of the AHFE 2017 International Conference on Human Factors in Robots and Unmanned Systems, 2017. Chen, J. (ed.). Springer-Verlag, p. 282-289 8 p. (Advances in Intelligent Systems and Computing; vol. 595).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automation
Regression analysis
Artificial intelligence
2017

Android app permission and users’ adoption: A case study of mental health application

Huang, H. Y. & Bashir, M., Jan 1 2017, Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017 Held as Part of HCI International 2017, Proceedings. Tryfonas, T. (ed.). Springer-Verlag, p. 110-122 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10292 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Anxiety
Privacy
Mobile Devices
Mobile devices

Cloud security certifications: A comparison to improve cloud service provider security

Di Giulio, C., Sprabery, R., Kamhoua, C., Kwiat, K., Campbell, R. H. & Bashir, M. N., Mar 22 2017, Proceedings of the 2nd International Conference on Internet of Things and Cloud Computing, ICC 2017. Hamdan, H., Boubiche, D. E. & Hidoussi, F. (eds.). Association for Computing Machinery, a120. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Security of data
Standardization

Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security?

Giulio, C. D., Sprabery, R., Kamhoua, C., Kwiat, K., Campbell, R. H. & Bashir, M. N., Sep 8 2017, Proceedings - 2017 IEEE 10th International Conference on Cloud Computing, CLOUD 2017. Fox, G. C. (ed.). IEEE Computer Society, p. 50-57 8 p. 8030571. (IEEE International Conference on Cloud Computing, CLOUD; vol. 2017-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Information technology

IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers

Giulio, C. D., Sprabery, R., Kamhoua, C., Kwiat, K., Campbell, R. & Bashir, M. N., Jul 10 2017, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. Institute of Electrical and Electronics Engineers Inc., p. 1090-1099 10 p. 7973818. (Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information technology
Cloud computing
Redundancy
Information systems

Personal influences on dynamic trust formation in human-agent interaction

Huang, H. Y. & Bashir, M., Oct 17 2017, HAI 2017 - Proceedings of the 5th International Conference on Human Agent Interaction. Association for Computing Machinery, Inc, p. 233-243 11 p. (HAI 2017 - Proceedings of the 5th International Conference on Human Agent Interaction).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human engineering
Automation
Controllers
Experiments

Privacy by region: Evaluation online users' privacy perceptions by geographical region

Huang, H. Y. & Bashir, M. N., Jan 17 2017, FTC 2016 - Proceedings of Future Technologies Conference. Institute of Electrical and Electronics Engineers Inc., p. 968-977 10 p. 7821721. (FTC 2016 - Proceedings of Future Technologies Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Geographical regions
privacy
Systems analysis
evaluation
regional difference

Stance classification of Twitter debates: The encryption debate as a use case

Addawood, A., Schneider, J. & Bashir, M., Jul 28 2017, 8th International Conference on Social Media and Society: Social Media for Good or Evil, #SMSociety 2017. Association for Computing Machinery, 3097288. (ACM International Conference Proceeding Series; vol. Part F129683).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
National security
Syntactics
Learning systems
2016

Understanding the personality characteristics of cybersecurity competition participants to improve the effectiveness of competitions as recruitment tools

Wee, C. & Bashir, M., Jan 1 2016, Advances in Human Factors in Cybersecurity - Proceedings of the AHFE International Conference on Human Factors in Cybersecurity, 2016. Nicholson, D. (ed.). Springer-Verlag, p. 111-121 11 p. (Advances in Intelligent Systems and Computing; vol. 501).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision making

Users' perspective on designing inclusive privacy-enhancing indicators

Huang, H. Y. & Bashir, M., Jan 1 2016, 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016. Institute of Electrical and Electronics Engineers Inc., p. 600-607 8 p. 7906993. (2016 14th Annual Conference on Privacy, Security and Trust, PST 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

privacy
Information technology
Systems analysis
Internet
invasion

Users’ privacy perceptions about wearable technology: Examining influence of personality, trust, and usability

Lamb, K., Huang, H. Y., Marturano, A. & Bashir, M., Jan 1 2016, Advances in Human Factors in Cybersecurity - Proceedings of the AHFE International Conference on Human Factors in Cybersecurity, 2016. Nicholson, D. (ed.). Springer-Verlag, p. 55-68 14 p. (Advances in Intelligent Systems and Computing; vol. 501).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Wearable technology

What motivates people to use Bitcoin?

Bashir, M., Strickland, B. & Bohr, J., Jan 1 2016, Social Informatics - 8th International Conference, SocInfo 2016, Proceedings. Ahn, Y-Y. & Spiro, E. (eds.). Springer-Verlag, p. 347-367 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10047 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Currency
Peer to peer networks
Social Structure
Alike
Peer-to-peer Networks
2015

Digital forensics education: A multidisciplinary curriculum model

Palmer, I., Wood, E., Nagy, S., Garcia, G., Bashir, M. & Campbell, R., Jan 1 2015, Digital Forensics and Cyber Crime - 7th International Conference, ICDF2C 2015, Revised Selected Papers. Breitinger, F. & James, J. I. (eds.). Springer-Verlag, p. 3-15 13 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 157).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Curricula
Education
Students
Digital forensics

Examining the gender gap in information assurance: A study of psychological factors

Huang, H. Y. & Bashir, M., Jan 1 2015, HCI International 2015 – Posters Extended Abstracts - International Conference, HCI International 2015, Proceedings. Stephanidis, C. (ed.). Springer-Verlag, p. 117-122 6 p. (Communications in Computer and Information Science; vol. 528).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Exploring the effectiveness of digital forensics tools on the Sony PlayStation Vita

Alvarez, K. & Bashir, M., Jan 1 2015, Digital Forensics and Cyber Crime - 7th International Conference, ICDF2C 2015, Revised Selected Papers. Breitinger, F. & James, J. I. (eds.). Springer-Verlag, p. 200-206 7 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 157).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metadata
Digital forensics

Is privacy a human right? An empirical examination in a global context

Huang, H. Y. & Bashir, M., Aug 31 2015, 2015 13th Annual Conference on Privacy, Security and Trust, PST 2015. Hisil, H., Ghorbani, A., Garcia-Alfaro, J., Koltuksuz, A., Torra, V., Zhang, J., Sensoy, M., Zincir, I. & Miri, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 77-84 8 p. 7232957. (2015 13th Annual Conference on Privacy, Security and Trust, PST 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Concretes

Quantitative security metrics with human in the loop

Noureddine, M., Keefe, K., Sanders, W. H. & Bashir, M., Apr 21 2015, Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015. Association for Computing Machinery, 2746215. (ACM International Conference Proceeding Series; vol. 21-22-April-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Human engineering
Uncertainty
2014

Who Uses Bitcoin? An exploration of the Bitcoin community

Bohr, J. & Bashir, M. N., Jan 1 2014, 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014. Miri, A., Josang, A., Garcia-Alfaro, J., Hengartner, U. & Huang, N-F. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 94-101 8 p. 6890928. (2014 12th Annual Conference on Privacy, Security and Trust, PST 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic money
2013

A Theoretical Model for Trust in Automated Systems

Bashir, M. N. & Hoff, K., Apr 27 2013, CHI EA 2013 - Extended Abstracts on Human Factors in Computing Systems: Changing Perspectives. Beaudouin-Lafon, M., Baudisch, P. & Mackay, W. E. (eds.). Association for Computing Machinery, p. 115-120 6 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2013-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automation
2011

Privacy in the cloud: Going beyond the contractarian paradigm

Bashir, M. N., Kesan, J. P., Hayes, C. M. & Zielinski, R., 2011, Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies, GTIP'11. p. 21-27 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Internet
Security of data
Innovation
Communication