Follow
Ingolf Becker
Ingolf Becker
Verified email at cs.ucl.ac.uk - Homepage
Title
Cited by
Cited by
Year
Productive security: A scalable methodology for analysing employee security behaviours
A Beautement, I Becker, S Parkin, K Krol, A Sasse
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 253-270, 2016
522016
Finding Security Champions in Blends of Organisational Culture
I Becker, S Parkin, MA Sasse
EuroUSEC '17, 2017
252017
Dataset: Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption
A Demjaha, J Spring, IF Becker, S Parkin, MA Sasse
UCL Jill Dando Institute of Security and Crime Science, 2018
21*2018
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption
A Demjaha, J Spring, IF Becker, S Parkin, MA Sasse
Workshop on Usable Security (USEC 2018), 2018
212018
From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design
MAS Steve Dodier-Lazaro, Ruba Abu-Salma, Ingolf Becker
CHI 2017 Workshop on Values in Computing, 7, 2017
212017
International comparison of bank fraud reimbursement: customer perceptions and contractual terms
I Becker, A Hutchings, R Abu-Salma, R Anderson, N Bohm, SJ Murdoch, ...
Journal of Cybersecurity 3 (2), 109-125, 2017
202017
Applying cognitive control modes to identify security fatigue hotspots
S Parkin, K Krol, I Becker, MA Sasse
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
192016
A socio-technical and co-evolutionary framework for reducing human-related risks in cyber security and cybercrime ecosystems
T Islam, I Becker, R Posner, P Ekblom, M McGuire, H Borrion, S Li
International Conference on Dependability in Sensor, Cloud, and Big Data …, 2019
162019
Interventions for Software security: Creating a lightweight program of assurance techniques for developers
C Weir, I Becker, J Noble, L Blair, A Sasse, A Rashid
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
142019
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength
I Becker, S Parkin, MA Sasse
27th USENIX Security Symposium (USENIX Security 18), 2018
142018
Combining Qualitative Coding and Sentiment Analysis: Deconstructing Perceptions of Usable Security in Organisations
I Becker, S Parkin, MA Sasse
Learning from Authoritative Security Experiment Results (LASER), 2016
122016
Interventions for long‐term software security: Creating a lightweight program of assurance techniques for developers
C Weir, I Becker, J Noble, L Blair, MA Sasse, A Rashid
Software: Practice and Experience 50 (3), 275-298, 2020
112020
Light-touch interventions to improve software development security
C Weir, L Blair, I Becker, A Sasse, J Noble
2018 IEEE Cybersecurity Development (SecDev), 85-93, 2018
92018
Are payment card contracts unfair?
SJ Murdoch, I Becker, R Abu-Salma, R Anderson, N Bohm, A Hutchings, ...
Financial Crypto, 2016
9*2016
A passion for security: intervening to help software developers
C Weir, I Becker, L Blair
2021 IEEE/ACM 43rd International Conference on Software Engineering …, 2021
72021
No Good Reason to Remove Features: Expert Users Value Useful Apps over Secure Ones
S Dodier-Lazaro, I Becker, J Krinke, A Sasse
HCI International 2017, 12, 2017
5*2017
In Control with no Control: Perceptions and Reality of Windows 10 Home Edition Update Features
J Morris, I Becker, S Parkin
Workshop on Usable Security (USEC), 2019
42019
Measuring the Success of {Context-Aware} Security Behaviour Surveys
I Becker, S Parkin, MA Sasse
The LASER Workshop: Learning from Authoritative Security Experiment Results …, 2017
22017
An analysis of perceptions and support for Windows 10 Home Edition update features
J Morris, I Becker, S Parkin
Journal of Cybersecurity 6 (1), tyaa017, 2020
12020
Measuring and Understanding Security Behaviours
I Becker
UCL (University College London), 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20