Masooda Bashir
Masooda Bashir
Associate Professor of Information Science, University of Illinois at Urbana Champaign
Verified email at - Homepage
Cited by
Cited by
Trust in automation: Integrating empirical evidence on factors that influence trust
KA Hoff, M Bashir
Human factors 57 (3), 407-434, 2015
Who uses bitcoin? an exploration of the bitcoin community
J Bohr, M Bashir
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
Use of apps in the COVID-19 response and the loss of privacy protection
T Sharma, M Bashir
Nature Medicine 26 (8), 1165-1167, 2020
Tracing information flows between ad exchanges using retargeted ads
MA Bashir, S Arshad, W Robertson, C Wilson
25th USENIX Security Symposium (USENIX Security 16), 481-496, 2016
Information privacy and data control in cloud computing: Consumers, privacy preferences, and market efficiency
JP Kesan, CM Hayes, MN Bashir
Wash. & Lee L. Rev. 70, 341, 2013
Online privacy and informed consent: The dilemma of information asymmetry
M Bashir, C Hayes, AD Lambert, JP Kesan
Proceedings of the Association for Information Science and Technology 52 (1 …, 2015
Users’ adoption of mental health apps: examining the impact of information cues
HY Huang, M Bashir
JMIR mHealth and uHealth 5 (6), e6827, 2017
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool
M Bashir, C Wee, N Memon, B Guo
Computers & Security 65, 153-165, 2017
What motivates people to use Bitcoin?
M Bashir, B Strickland, J Bohr
Social Informatics: 8th International Conference, SocInfo 2016, Bellevue, WA …, 2016
Developing a new digital forensics curriculum
A Lang, M Bashir, R Campbell, L DeStefano
Digital Investigation 11, S76-S84, 2014
“What is your evidence?” A study of controversial topics on social media
A Addawood, M Bashir
Proceedings of the Third Workshop on Argument Mining (ArgMining2016), 1-11, 2016
A comprehensive empirical study of data privacy, trust, and consumer autonomy
JP Kesan, CM Hayes, MN Bashir
Ind. LJ 91, 267, 2015
Cloud standards in comparison: Are new security frameworks improving cloud security?
C Di Giulio, R Sprabery, C Kamhoua, K Kwiat, RH Campbell, MN Bashir
2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 50-57, 2017
On the Memorability of System-generated {PINs}: Can Chunking Help?
JH Huh, H Kim, RB Bobba, MN Bashir, K Beznosov
eleventh symposium on usable privacy and security (SOUPS 2015), 197-209, 2015
Stance classification of twitter debates: The encryption debate as a use case
A Addawood, J Schneider, M Bashir
Proceedings of the 8th international conference on Social Media & Society, 1-10, 2017
The onion router: Understanding a privacy enhancing technology community
HY Huang, M Bashir
Proceedings of the Association for Information Science and Technology 53 (1 …, 2016
A theoretical model for trust in automated systems
K Hoff, M Bashir
CHI'13 extended abstracts on human factors in computing systems, 115-120, 2013
A case study-based cybersecurity ethics curriculum
J Blanken-Webb, I Palmer, SE Deshaies, NC Burbules, RH Campbell, ...
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
An examination of the vocational and psychological characteristics of cybersecurity competition participants
M Bashir, A Lambert, JMC Wee, B Guo
2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015
Enabling user-centered privacy controls for mobile applications: COVID-19 perspective
T Sharma, HA Dyer, M Bashir
ACM Transactions on Internet Technology (TOIT) 21 (1), 1-24, 2021
The system can't perform the operation now. Try again later.
Articles 1–20