PhD thesis
- Reeder, R.W. Expandable Grids: A user interface
visualization technique and a policy semantics to support fast,
accurate security and privacy policy authoring. PhD thesis,
Carnegie Mellon University Computer Science Department. CMU tech
report number CMU-CS-08-143. July, 2008.
[PDF]
Selected publications
- Reeder, R.W., Felt, A.P., Consolvo, S., Malkin, N., Thompson, C., and Egelman, S.
An Experience Sampling Study of User Reactions to Browser Warnings in the Field.
ACM SIGCHI Conference on Human Factors in Computing Systems (CHI '18). 2018.
[Authors' PDF] - Reeder, R.W., Ion, I., and Consolvo, S. 152 simple steps to stay safe online: security advice for non-tech-savvy users. IEEE Security & Privacy. 15(5):55-64. October, 2017.
[Authors' PDF] [copyright] - Felt, A.P., Reeder, R.W., Ainslie, A., Harris, H., Walker, M., Thompson, C., Acer, M.E., Morant, E., and Consolvo, S.
Rethinking Connection Security Indicators.
Symposium on Usable Privacy and Security (SOUPS '16). 2016.
[Authors' PDF] - Ion, I., Reeder, R.W., and Consolvo, S.
"... no one can hack my mind": Comparing Expert and Non-Expert Security Practices.
Symposium on Usable Privacy and Security (SOUPS '15). 2015.
[Authors' PDF] - Felt, A.P., Ainslie, A., Reeder, R.W., Consolvo, S., Thyagaraja, S., Bettes, A., Harris, H., and Grimes, J.
Improving SSL Warnings: Comprehension and Adherence.
ACM SIGCHI Conference on Human Factors in Computing Systems (CHI '15). 2015.
[Authors' PDF] [copyright] - Almuhimedi, H., Felt, A.P., Reeder, R.W., and Consolvo, S.
Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning.
Symposium on Usable Privacy and Security (SOUPS '14). 2014.
[Authors' PDF] - Felt, A.P., Reeder, R.W., Almuhimedi, H., and Consolvo, S.
Experimenting At Scale With Google Chrome's SSL Warning.
ACM SIGCHI Conference on Human Factors in Computing Systems (CHI '14). 2014.
[Authors' PDF] [copyright] - Reeder, R.W., Cram Kowalczyk, E., and Shostack, A. Helping engineers design NEAT security warnings. Extended poster abstract at Symposium on Usable Privacy and Security (SOUPS '11). 2011.
[SOUPS proceedings PDF] - Kelley, P.G., Bresee, J., Cranor, L.F., and Reeder, R.W. A "Nutrition Label" for Privacy. Symposium on Usable Privacy and Security (SOUPS '09). 2009.
- Schechter, S., Egelman, S., and Reeder, R.W. It's Not
What You Know, but Who You Know: A Social Approach to Last-Resort Authentication.
ACM SIGCHI Conference on Human Factors in Computing Systems (CHI '09). 2009.
[Authors' PDF] [copyright] - Reeder, R.W., Bauer, L., Cranor, L.F., Reiter, M.K., Bacon, K.,
How, K., and Strong, H. Expandable Grids for Visualizing and
Authoring Computer Security Policies. ACM SIGCHI Conference on
Human Factors in Computing Systems (CHI '08). 2008.
[Authors' PDF] [copyright]
Additional publications
- Matthews, T., Liao, K., Turner, A., Berkovich, M., Reeder, R.W., and Consolvo, S. "She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI '16). 2016.
- Shay, R., Ion, I., Reeder, R.W., and Consolvo, S.
My religious aunt asked why I was trying to sell her
viagra: Experiences with account hijacking.
ACM SIGCHI Conference on Human Factors in Computing Systems (CHI '14). 2014.
[Authors' PDF] [copyright] - Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S., Reeder, R.W., Schechter, S., and Sleeper, M. Your Attention Please: Designing security-decision UIs to make genuine risks harder to ignore. Symposium on Usable Privacy and Security (SOUPS '13). 2013. [SOUPS proceedings PDF]
- Reeder, R.W., Bauer, L., Cranor, L.F., Reiter, M.K., and Vaniea, K.
More than Skin Deep: Measuring the Effects of the Underlying Model on
Access-Control System Usability.
ACM SIGCHI Conference on Human Factors in Computing Systems (CHI '11). 2011.
[Authors' PDF] [copyright] - Lipford, H.R., Watson, J., Whitney, M., Froiland, K., and
Reeder, R.W.. Visual vs. Compact: A Comparison of Privacy
Policy Interfaces. ACM SIGCHI Conference on Human Factors in
Computing Systems (CHI '10). 2010.
[Authors' PDF] [copyright] - Johnson, M.L., Bellovin, S.M., Reeder, R.W., and
Schechter, S.E. Laissez-faire file sharing. New Security
Paradigms Workshop (NSPW 2009). 2009.
[Authors' PDF] - McDonald, A.M., Reeder, R.W., Kelley, P.G., and Cranor,
L.F. A Comparative Study of Online Privacy Policies and Formats.
Privacy Enhancing Technologies Symposium (PETS 2009). 2009.
[Authors' PDF] - Schechter, S., and Reeder, R.W. 1 + 1 = You: Measuring the Comprehensibility of Metaphors for Configuring Backup Authentication. Symposium on Usable Privacy and Security (SOUPS '09). 2009.
- Reeder, R.W., and Schechter, S. When the Password Doesn't Work: Secondary Authentication for Websites. IEEE Security & Privacy. March, 2011.
- Bauer, L., Cranor, L.F., Reeder, R.W., Reiter, M.K., and Vaniea, K.
Real Life Challenges in Access-Control Management.
ACM SIGCHI Conference on Human Factors in Computing Systems (CHI '09). 2009.
[DOI: 10.1145/1518701.1518838] - Reeder, R.W., Kelley, P.G., McDonald, A.M., and Cranor,
L.F. A User Study of the Expandable Grid Applied to P3P Privacy
Policy Visualization. 2008 ACM Workshop on Privacy in the
Electronic Society (WPES '08). 2008.
[Authors' PDF] [copyright] - Bauer, L., Cranor, L.F., Reeder, R.W., Reiter, M.K., and
Vaniea, K. A
User Study of Policy Creation in a Flexible Access-Control System.
ACM SIGCHI Conference on Human Factors in
Computing Systems (CHI '08). 2008.
[Authors' PDF] [copyright] - Reeder, R.W., Karat, C.-M., Karat, J., and Brodie, C.
Usability Challenges in Security and Privacy Policy-Authoring
Interfaces. Presented at INTERACT 2007. Published
in Springer Lecture Notes in Computer Science (LNCS 4663, Part II,
pp. 141-155). 2007.
[Authors' PDF] [DOI: 10.1007/978-3-540-74800-7_11] - Reeder, R.W. and Maxion, R.A. User Interface Defect Detection
by Hesitation Analysis. International
Conference on Dependable Systems and Networks (DSN'06) (Philadelphia,
PA, USA, June 26-29, 2006). 2006.
[PDF] [copyright] [DOI: 10.1109/DSN.2006.71] - Reeder, R.W. and Maxion, R.A. User Interface Dependability
through Goal-Error Prevention. International Conference on
Dependable Systems and Networks (DSN'05)
(Yokohama, Japan, June 28 - July 1, 2005). 2005.
[PDF] [copyright] [DOI: 10.1109/DSN.2005.95] - Maxion, R.A. and Reeder, R.W. Improving
User-Interface Dependability
through Mitigation of Human Error. International Journal of Human-Computer
Studies. 63 (1-2):25-50. 2005.
[Authors' PDF] [DOI: 10.1016/j.ijhcs.2005.04.009] - Pirolli, P., Fu, W.-T., Reeder, R., and Card, S.K. A User-Tracing Architecture for Modeling Interaction with the World Wide Web, Advanced Visual Interfaces, Trento, Italy, 2002.
- Card, S.K., Pirolli, P., Van Der Wege, M., Morrison, J.B., Reeder,
R.W., Schraedley, P., & Boshart, J. Information Scent as a Driver
of Web Behavior Graphs: Results of a Protocol Analysis Method for Web
Usability. Proceedings of the ACM SIGCHI Conference
on Human Factors in Computing Systems (CHI '01) (Seattle, WA, USA,
March 31 - April 5, 2001). 2001.
[DOI: 10.1145/365024.365331] - Reeder, R.W., Pirolli, P., and Card, S.K. WebEyeMapper and
WebLogger: Tools for Analyzing Eye Tracking Data Collected in Web-use
Studies. Demonstration and extended abstract presented at ACM SIGCHI
Conference on Human Factors in Computing Systems (CHI '01) (Seattle,
WA, USA, March 31 - April 5, 2001). 2001.
[DOI: 10.1145/634067.634082] - Landwehr, P., Lee, D., McGlohon, M., and Reeder, R.
Dolla Dolla Bill Yall: Is There a Bias to the Orientation of Dollar
Bills Put in the Coke Machine? In A Record of the Proceedings of
SIGBOVIK 2008. 2008. Caution: may be amusing.
[PDF, pp. 29-30] - Reeder, R.W. and Arshad, F. SOUPS 2005. Symposium on Usable
Privacy and Security conference report published in IEEE Security and
Privacy. September, 2005.
[DOI: 10.1109/MSP.2005.131] - Reeder, R.W., Pirolli, P., and Card, S.K. WebLogger: A Data
Collection Tool for Web-use Studies. Xerox PARC technical report
UIR-2000-06. 2000.
[PDF]
Copyright notices
- © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.© ACM, 2008. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution.© ACM, 2008. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution.©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.