Masooda Bashir
Masooda Bashir
Assistant Professor of Information Science, University of Illinois at Urbana Champaign
Verified email at - Homepage
Cited by
Cited by
Trust in automation: Integrating empirical evidence on factors that influence trust
KA Hoff, M Bashir
Human factors 57 (3), 407-434, 2015
Who uses bitcoin? an exploration of the bitcoin community
J Bohr, M Bashir
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
Use of apps in the COVID-19 response and the loss of privacy protection
T Sharma, M Bashir
Nature Medicine 26 (8), 1165-1167, 2020
Information privacy and data control in cloud computing: Consumers, privacy preferences, and market efficiency
JP Kesan, CM Hayes, MN Bashir
Wash. & Lee L. Rev. 70, 341, 2013
Developing a new digital forensics curriculum
A Lang, M Bashir, R Campbell, L DeStefano
Digital Investigation 11, S76-S84, 2014
Online privacy and informed consent: The dilemma of information asymmetry
M Bashir, C Hayes, AD Lambert, JP Kesan
Proceedings of the Association for Information Science and Technology 52 (1 …, 2015
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool
M Bashir, C Wee, N Memon, B Guo
Computers & Security 65, 153-165, 2017
Users’ adoption of mental health apps: examining the impact of information cues
HY Huang, M Bashir
JMIR mHealth and uHealth 5 (6), e6827, 2017
What motivates people to use Bitcoin?
M Bashir, B Strickland, J Bohr
International Conference on Social Informatics, 347-367, 2016
“What is your evidence?” A study of controversial topics on social media
A Addawood, M Bashir
Proceedings of the Third Workshop on Argument Mining (ArgMining2016), 1-11, 2016
On the memorability of system-generated pins: Can chunking help?
JH Huh, H Kim, RB Bobba, MN Bashir, K Beznosov
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 197-209, 2015
A comprehensive empirical study of data privacy, trust, and consumer autonomy
JP Kesan, CM Hayes, MN Bashir
Ind. LJ 91, 267, 2015
Stance classification of twitter debates: The encryption debate as a use case
A Addawood, J Schneider, M Bashir
Proceedings of the 8th International Conference on Social Media & Society, 1-10, 2017
Cloud standards in comparison: Are new security frameworks improving cloud security?
C Di Giulio, R Sprabery, C Kamhoua, K Kwiat, RH Campbell, MN Bashir
2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 50-57, 2017
Are Bitcoin Users Less Sociable? An analysis of users’ language and social connections on twitter
I Hernandez, M Bashir, G Jeon, J Bohr
International Conference on Human-Computer Interaction, 26-31, 2014
An examination of the vocational and psychological characteristics of cybersecurity competition participants
M Bashir, A Lambert, JMC Wee, B Guo
2015 {USENIX} Summit on Gaming, Games, and Gamification in Security …, 2015
A theoretical model for trust in automated systems
K Hoff, M Bashir
CHI'13 Extended Abstracts on Human Factors in Computing Systems, 115-120, 2013
The onion router: Understanding a privacy enhancing technology community
HY Huang, M Bashir
Proceedings of the Association for Information Science and Technology 53 (1 …, 2016
Users’ privacy perceptions about wearable technology: examining influence of personality, trust, and usability
K Lamb, HY Huang, A Marturano, M Bashir
Advances in human factors in cybersecurity, 55-68, 2016
Privacy in the cloud: going beyond the contractarian paradigm
MN Bashir, JP Kesan, CM Hayes, R Zielinski
Proceedings of the 2011 workshop on governance of technology, information …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20