Rick Wash
Cited by
Cited by
Student use of Facebook for organizing collaborative classroom activities
C Lampe, DY Wohn, J Vitak, NB Ellison, R Wash
International Journal of Computer-Supported Collaborative Learning 6 (3 …, 2011
Motivations to participate in online communities
C Lampe, R Wash, A Velasquez, E Ozkaya
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2010
Folk models of home computer security
R Wash
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-16, 2010
Understanding password choices: How frequently entered passwords are re-used across websites
R Wash, E Rader, R Berman, Z Wellmer
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 175-188, 2016
Stories as informal lessons about security
E Rader, R Wash, B Brooks
Proceedings of the Eighth Symposium on Usable Privacy and Security, 1-17, 2012
The S in Social Network Games: Initiating, Maintaining, and Enhancing Relationships
DY Wohn, C Lampe, R Wash, N Ellison, J Vitak
2011 44th Hawaii International Conference on System Sciences (HICSS),, 1-10, 2011
Coordinating donors on crowdfunding websites
R Wash, J Solomon
Proceedings of the 17th ACM conference on Computer supported cooperative …, 2014
Betrayed by updates: how negative experiences affect future security
KE Vaniea, E Rader, R Wash
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
The value of completing crowdfunding projects
R Wash
Proceedings of the International AAAI Conference on Web and Social Media 7 …, 2013
Too much knowledge? security beliefs and protective behaviors among united states internet users
R Wash, E Rader
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 309-325, 2015
Don't wait! How timing affects coordination of crowdfunding donations
J Solomon, W Ma, R Wash
Proceedings of the 18th acm conference on computer supported cooperative …, 2015
Influencing mental models of security: a research agenda
R Wash, E Rader
Proceedings of the 2011 New Security Paradigms Workshop, 57-66, 2011
Out of the loop: How automated software updates cause unintended security consequences
R Wash, E Rader, K Vaniea, M Rizor
10th Symposium On Usable Privacy and Security (SOUPS 2014), 89-104, 2014
Identifying patterns in informal sources of security information
E Rader, R Wash
Journal of Cybersecurity 1 (1), 121-144, 2015
The future of Internet worms
J Nazario, J Anderson, R Wash, C Connelly
In Black Hat USA, 2001
Who provides phishing training? Facts, stories, and people like me
R Wash, MM Cooper
Proceedings of the 2018 chi conference on human factors in computing systems …, 2018
Influences on tag choices in del. icio. us
E Rader, R Wash
Proceedings of the 2008 ACM conference on Computer supported cooperative …, 2008
Public bookmarks and private benefits: An analysis of incentives in social computing
R Wash, E Rader
Proceedings of the American Society for Information Science and Technology …, 2007
An economic response to unsolicited communication
T Loder, M Van Alstyne, R Wash
Advances in Economic Analysis and Policy 6 (1), 2006
Latent users in an online user-generated content community
A Velasquez, R Wash, C Lampe, T Bjornrud
Computer Supported Cooperative Work (CSCW) 23 (1), 21-50, 2014
The system can't perform the operation now. Try again later.
Articles 1–20