Follow
Hana Habib
Hana Habib
Verified email at andrew.cmu.edu
Title
Cited by
Cited by
Year
Privacy expectations and preferences in an {IoT} world
PE Naeini, S Bhagavatula, H Habib, M Degeling, L Bauer, LF Cranor, ...
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 399-412, 2017
2372017
Let's go in for a closer look: Observing passwords in their natural habitat
S Pearman, J Thomas, PE Naeini, H Habib, L Bauer, N Christin, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1162017
Design and evaluation of a data-driven password meter
B Ur, F Alfieri, M Aung, L Bauer, N Christin, J Colnago, LF Cranor, ...
Proceedings of the 2017 chi conference on human factors in computing systems …, 2017
1112017
How short is too short? implications of length and framing on the effectiveness of privacy notices
J Gluck, F Schaub, A Friedman, H Habib, N Sadeh, LF Cranor, Y Agarwal
Twelfth symposium on usable privacy and security (SOUPS 2016), 321-340, 2016
1042016
" It's a scavenger hunt": Usability of Websites' Opt-Out and Data Deletion Choices
H Habib, S Pearman, J Wang, Y Zou, A Acquisti, LF Cranor, N Sadeh, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
642020
An Empirical Analysis of Data Deletion and {Opt-Out} Choices on 150 Websites
H Habib, Y Zou, A Jannu, N Sridhar, C Swoopes, A Acquisti, LF Cranor, ...
Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 387-406, 2019
532019
Finding a choice in a haystack: Automatic extraction of opt-out statements from privacy policy text
V Bannihatti Kumar, R Iyengar, N Nisal, Y Feng, H Habib, P Story, ...
Proceedings of The Web Conference 2020, 1943-1954, 2020
462020
Sharing personal content online: Exploring channel choice and multi-channel behaviors
M Sleeper, W Melicher, H Habib, L Bauer, LF Cranor, ML Mazurek
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
452016
Password Creation in the Presence of Blacklists
H Habib, J Colnago, W Melicher, B Ur, S Segreti, L Bauer, N Christin, ...
Proc. USEC, 2017
402017
Away from prying eyes: analyzing usage and understanding of private browsing
H Habib, J Colnago, V Gopalakrishnan, S Pearman, J Thomas, A Acquisti, ...
Fourteenth symposium on usable privacy and security (SOUPS 2018), 159-175, 2018
372018
User behaviors and attitudes under password expiration policies
H Habib, PE Naeini, S Devlin, M Oates, C Swoopes, L Bauer, N Christin, ...
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 13-30, 2018
302018
Toggles, dollar signs, and triangles: How to (in) effectively convey privacy choices with icons and link texts
H Habib, Y Zou, Y Yao, A Acquisti, L Cranor, J Reidenberg, N Sadeh, ...
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
192021
Impact of contextual factors on snapchat public sharing
H Habib, N Shah, R Vaish
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
182019
Design and evaluation of a usable icon and tagline to signal an opt-out of the sale of personal information as required by CCPA
LF Cranor, H Habib, Y Zou, A Acquisti, J Reidenberg, N Sadeh, F Schaub
Retrieved September 13th, 2020
72020
CCPA Opt-Out Icon Testing–Phase 2
LF Cranor, H Habib, Y Yao, Y Zou, A Acquisti, J Reidenberg, N Sadeh, ...
Submitted to California Office of Attorney General, 2020
42020
“Okay, whatever”: An Evaluation of Cookie Consent Interfaces
H Habib, M Li, E Young, L Cranor
CHI Conference on Human Factors in Computing Systems, 1-27, 2022
32022
User testing of the proposed CCPA do-not-sell icon
LF Cranor, H Habib, Y Zou, A Acquisti, J Reidenberg, N Sadeh, F Schaub
Submitted to California Office of Attorney General, 2020
22020
How short is too short
J Gluck, F Schaub, A Friedman, H Habib, N Sadeh, LF Cranor, Y Agarwal
Implications of Length and Framing on the Effectiveness of Privacy Notices …, 2016
22016
Identifying user needs for advertising controls on Facebook
H Habib, S Pearman, E Young, I Saxena, R Zhang, LFI Cranor
Proceedings of the ACM on Human-Computer Interaction 6 (CSCW1), 1-42, 2022
12022
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research
V Distler, M Fassl, H Habib, K Krombholz, G Lenzini, C Lallemand, ...
ACM Transactions on Computer-Human Interaction (TOCHI) 28 (6), 1-50, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20