Follow
Rick Wash
Title
Cited by
Cited by
Year
Student use of Facebook for organizing collaborative classroom activities
C Lampe, DY Wohn, J Vitak, NB Ellison, R Wash
International Journal of Computer-Supported Collaborative Learning 6, 329-347, 2011
5432011
Folk models of home computer security
R Wash
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-16, 2010
5112010
Motivations to participate in online communities
C Lampe, R Wash, A Velasquez, E Ozkaya
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2010
4932010
Understanding password choices: How frequently entered passwords are re-used across websites
R Wash, E Rader, R Berman, Z Wellmer
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 175-188, 2016
2512016
Stories as informal lessons about security
E Rader, R Wash, B Brooks
Proceedings of the Eighth Symposium on Usable Privacy and Security, 1-17, 2012
2232012
Betrayed by updates: how negative experiences affect future security
KE Vaniea, E Rader, R Wash
Proceedings of the SIGCHI conference on human factors in computing systems …, 2014
1642014
Too much knowledge? security beliefs and protective behaviors among united states internet users
R Wash, E Rader
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 309-325, 2015
1592015
Who provides phishing training? facts, stories, and people like me
R Wash, MM Cooper
Proceedings of the 2018 chi conference on human factors in computing systems …, 2018
1532018
The S in Social Network Games: Initiating, Maintaining, and Enhancing Relationships
DY Wohn, C Lampe, R Wash, N Ellison, J Vitak
2011 44th Hawaii International Conference on System Sciences (HICSS),, 1-10, 2011
1522011
Coordinating donors on crowdfunding websites
R Wash, J Solomon
Proceedings of the 17th ACM conference on Computer supported cooperative …, 2014
1502014
The value of completing crowdfunding projects
R Wash
proceedings of the international AAAI conference on Web and social media 7 …, 2013
1492013
Identifying patterns in informal sources of security information
E Rader, R Wash
Journal of Cybersecurity 1 (1), 121-144, 2015
1272015
Out of the loop: How automated software updates cause unintended security consequences
R Wash, E Rader, K Vaniea, M Rizor
10th Symposium On Usable Privacy and Security (SOUPS 2014), 89-104, 2014
1172014
Don't wait! How timing affects coordination of crowdfunding donations
J Solomon, W Ma, R Wash
Proceedings of the 18th acm conference on computer supported cooperative …, 2015
1162015
Influencing mental models of security: a research agenda
R Wash, E Rader
Proceedings of the 2011 New Security Paradigms Workshop, 57-66, 2011
1102011
The future of Internet worms
J Nazario, J Anderson, R Wash, C Connelly
Black Hat USA, 2001
80*2001
How experts detect phishing scam emails
R Wash
Proceedings of the ACM on Human-Computer Interaction 4 (CSCW2), 1-28, 2020
762020
Influences on tag choices in del. icio. us
E Rader, R Wash
Proceedings of the 2008 ACM conference on Computer supported cooperative …, 2008
752008
Can people self-report security accurately? Agreement between self-report and behavioral measures
R Wash, E Rader, C Fennell
Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017
692017
Latent users in an online user-generated content community
A Velasquez, R Wash, C Lampe, T Bjornrud
Computer Supported Cooperative Work (CSCW) 23, 21-50, 2014
612014
The system can't perform the operation now. Try again later.
Articles 1–20