default search action
Mary Frances Theofanos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Kristen K. Greene, Mary Frances Theofanos, Craig Watson, Anne Andrews, Eyeisha Barron:
Avoiding Past Mistakes in Unethical Human Subjects Research: Moving From Artificial Intelligence Principles to Practice. Computer 57(2): 53-63 (2024) - 2023
- [c22]Julie M. Haney, Sandra Spickard Prettyman, Mary Frances Theofanos, Susanne M. Furman:
Data Guardians' Behaviors and Challenges While Caring for Others' Personal Data. HCI (35) 2023: 163-183 - 2021
- [j16]Steven Furnell, Julie M. Haney, Mary Theofanos:
Pandemic Parallels: What Can Cybersecurity Learn From COVID-19? Computer 54(3): 68-72 (2021) - [c21]Kerrianne Morrison, Shaneé Dawkins, Yee-Yin Choong, Mary Frances Theofanos, Kristen K. Greene, Susanne Furman:
Current Problems, Future Needs: Voices of First Responders About Communication Technology. HCI (3) 2021: 381-399 - [c20]Mary Theofanos, Yee-Yin Choong, Olivia Murphy:
'Passwords Keep Me Safe' - Understanding What Children Think about Passwords. USENIX Security Symposium 2021: 19-35 - 2020
- [j15]Mary Theofanos:
Is Usable Security an Oxymoron? Computer 53(2): 71-74 (2020) - [j14]Michelle Steves, Kristen K. Greene, Mary Theofanos:
Categorizing human phishing difficulty: a Phish Scale. J. Cybersecur. 6(1) (2020)
2010 – 2019
- 2019
- [j13]Yee-Yin Choong, Mary Frances Theofanos, Karen Renaud, Suzanne Prior:
"Passwords protect my stuff" - a study of children's password practices. J. Cybersecur. 5(1): tyz015 (2019) - 2018
- [j12]Kristen K. Greene, Michelle Steves, Mary Theofanos:
No Phishing beyond This Point. Computer 51(6): 86-89 (2018) - [c19]Julie M. Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman:
"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products. SOUPS @ USENIX Security Symposium 2018: 357-373 - 2017
- [c18]Julie M. Haney, Simson L. Garfinkel, Mary Frances Theofanos:
Organizational practices in cryptographic development and testing. CNS 2017: 1-9 - [c17]Haiying Guan, Paul Lee, Andrew Dienstfrey, Mary Theofanos, Curtis Lamp, Brian C. Stanton, Matthew T. Schwarz:
Analysis, Comparison, and Assessment of Latent Fingerprint Image Preprocessing. CVPR Workshops 2017: 628-635 - 2016
- [j11]Mary Theofanos, Simson L. Garfinkel, Yee-Yin Choong:
Secure and Usable Enterprise Authentication: Lessons from the Field. IEEE Secur. Priv. 14(5): 14-21 (2016) - [j10]Brian C. Stanton, Mary Frances Theofanos, Sandra Spickard Prettyman, Susanne Furman:
Security Fatigue. IT Prof. 18(5): 26-32 (2016) - 2015
- [c16]Michelle Steves, Mary Theofanos, Celia Paulsen, Athos Ribeiro:
Password Policy Languages: Usable Translation from the Informal to the Formal. HCI (22) 2015: 119-130 - [c15]Sandra Spickard Prettyman, Susanne Furman, Mary Theofanos, Brian C. Stanton:
Privacy and Security in the Brave New World: The Use of Multiple Mental Models. HCI (22) 2015: 260-270 - [c14]Yee-Yin Choong, Mary Theofanos:
What 4, 500+ People Can Tell You - Employees' Attitudes Toward Organizational Password Policy Do Matter. HCI (22) 2015: 299-310 - [c13]Brian C. Stanton, Mary Theofanos, Karuna P. Joshi:
Framework for Cloud Usability. HCI (22) 2015: 664-671 - 2014
- [c12]Susanne Furman, Mary Frances Theofanos:
Preserving Privacy - More Than Reading a Message. HCI (7) 2014: 14-25 - [c11]Jennifer C. Romano Bergstrom, Stefan A. Frisch, David Charles Hawkins, Joy Hackenbracht, Kristen K. Greene, Mary Frances Theofanos, Brian Griepentrog:
Development of a Scale to Assess the Linguistic and Phonological Difficulty of Passwords. HCI (19) 2014: 131-139 - [c10]Michelle Steves, Kevin S. Killourhy, Mary Frances Theofanos:
Clear, Unambiguous Password Policies: An Oxymoron? HCI (19) 2014: 240-251 - [c9]Yee-Yin Choong, Mary Theofanos:
Ten-print fingerprint self-captures: Graphics-only user guidance without language. IJCB 2014: 1-8 - 2013
- [c8]Haiying Guan, Andrew Dienstfrey, Mary Frances Theofanos:
A New Metric for Latent Fingerprint Image Preprocessing. CVPR Workshops 2013: 84-91 - 2012
- [j9]Susanne Furman, Mary Frances Theofanos, Yee-Yin Choong, Brian C. Stanton:
Basing Cybersecurity Training on User Perceptions. IEEE Secur. Priv. 10(2): 40-49 (2012) - [c7]Yee-Yin Choong, Mary Frances Theofanos, Haiying Guan:
Fingerprint self-captures: Usability of a fingerprint system with real-time feedback. BTAS 2012: 16-22 - 2011
- [j8]Mary Frances Theofanos, Shari Lawrence Pfleeger:
Guest Editors' Introduction: Shouldn't All Security Be Usable? IEEE Secur. Priv. 9(2): 12-17 (2011) - [c6]Mary Frances Theofanos, Brian C. Stanton:
Usability Standards across the Development Lifecycle. HCI (16) 2011: 130-137 - [c5]Haiying Guan, Mary Frances Theofanos, Yee-Yin Choong, Brian C. Stanton:
Real-time feedback for usable fingerprint systems. IJCB 2011: 1-8 - [c4]Celeste Lyn Paul, Emile L. Morse, Aiping Zhang, Yee-Yin Choong, Mary Frances Theofanos:
A Field Study of User Behavior and Perceptions in Smartcard Authentication. INTERACT (4) 2011: 1-17
2000 – 2009
- 2009
- [j7]Mary Frances Theofanos, Ross J. Micheals, Brian C. Stanton:
Biometrics Systems Include Users. IEEE Syst. J. 3(4): 461-468 (2009) - 2008
- [j6]Mary Frances Theofanos, Ross J. Micheals, Shahram Orandi, Brian C. Stanton, Nien-Fan Zhang:
How the subject can improve fingerprint image quality. J. Electronic Imaging 17(1): 011007 (2008) - 2006
- [j5]Mary Frances Theofanos:
A practical guide to the CIF: usability measurements. Interactions 13(6): 34-37 (2006) - [c3]Mary Frances Theofanos, Ross J. Micheals, Jean Scholtz, Emile L. Morse, Peter May:
Does habituation affect fingerprint quality? CHI Extended Abstracts 2006: 1427-1432 - [c2]Jean Scholtz, Mary Frances Theofanos, Brian Antonishek:
Development of a test bed for evaluating human-robot performance for explosive ordnance disposal robots. HRI 2006: 10-17 - 2005
- [j4]Mary Frances Theofanos:
Common Industry Format approved as international standard. Interactions 12(5): 46-47 (2005) - 2003
- [j3]Mary Frances Theofanos, Janice Redish:
Bridging the gap: between accessibility and usability. Interactions 10(6): 36-51 (2003)
1990 – 1999
- 1996
- [j2]Mary Frances Theofanos, Shari Lawrence Pfleeger:
Wavefront: a goal-driven requirements process model. Inf. Softw. Technol. 38(8): 507-519 (1996) - 1993
- [c1]Alan M. Davis, Scott Overmyer, Kathleen Jordan, Joseph Caruso, Fatma Dandashi, Anhtuan Dinh, Gary Kincaid, Glen Ledeboer, Patricia Reynolds, Pradip Sitaram, Anh Ta, Mary Theofanos:
Identifying and measuring quality in a software requirements specification. IEEE METRICS 1993: 141-152
1980 – 1989
- 1989
- [j1]Charles P. Pfleeger, Shari Lawrence Pfleeger, Mary Frances Theofanos:
A methodology for penetration testing. Comput. Secur. 8(7): 613-620 (1989)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint