Author: Ponnurangam Kumaraguru

Ponnurangam Kumaraguru

Ponnurangam Kumaraguru

Publications

Publication period start: 2007
Publication period end: 2012
Number of co-authors: 25

Co-authors

Number of publications with favourite co-authors
Alessandro Acquisti
4
Jason Hong
4
Lorrie Faith Cranor
4

Productive Colleagues

Most productive colleagues in number of publications
Marc Langheinrich
13
Jason Hong
20
Lorrie Faith Cranor
44

Publications

Kumaraguru, Ponnurangam, Rhee, Yong, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason, Nunge, Elizabeth (2007): Protecting people from phishing: the design and evaluation of an embedded training email s. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems , 2007, . pp. 905-914. http://doi.acm.org/10.1145/1240624.1240760

Kumaraguru, Ponnurangam, Rhee, Yong, Sheng, Steve, Hasan, Sharique, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason (2007): Getting users to pay attention to anti-phishing education: evaluation of retention and tra. In: Proceedings of the 2007 Anti-Phishing Working Groups eCrime Researchers Summit , 2007, . pp. 70-81. http://doi.acm.org/10.1145/1299015.1299022

Sheng, Steve, Magnien, Bryant, Kumaraguru, Ponnurangam, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason, Nunge, Elizabeth (2007): Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall fo. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 88-99. http://cups.cs.cmu.edu/soups/2007/proceedings/p88_sheng.pdf

Kumaraguru, Ponnurangam, Cranshaw, Justin, Acquisti, Alessandro, Cranor, Lorrie, Hong, Jason, Blair, Mary Ann, Pham, Theodore (2009): School of phish: a real-word evaluation of anti-phishing training. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 3. http://doi.acm.org/10.1145/1572532.1572536

Ion, Iulia, Langheinrich, Marc, Kumaraguru, Ponnurangam, Capkun, Srdjan (2010): Influence of user perception, security needs, and social factors on device pairing method . In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 6. http://doi.acm.org/10.1145/1837110.1837118

Sheng, Steve, Holbrook, Mandy, Kumaraguru, Ponnurangam, Cranor, Lorrie Faith, Downs, Julie (2010): Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness . In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 373-382. http://doi.acm.org/10.1145/1753326.1753383

Khot, Rohit Ashok, Srinathan, Kannan, Kumaraguru, Ponnurangam (2011): MARASIM: a novel jigsaw based authentication scheme using tagging. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2605-2614. http://dx.doi.org/10.1145/1978942.1979322

Ion, Iulia, Sachdeva, Niharika, Kumaraguru, Ponnurangam, Èapkun, Srdjan (2011): Home is safer than the cloud!: privacy concerns for consumer cloud storage. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 13. http://dx.doi.org/10.1145/2078827.2078845

Pontes, Tatiana, Vasconcelos, Marisa, Almeida, Jussara, Kumaraguru, Ponnurangam, Almeida, Virgilio (2012): We know where you live: privacy characterization of foursquare behavior. In: Proceedings of the 2012 International Conference on Uniquitous Computing , 2012, . pp. 898-905.