Precog - Bibliography of publications
@article{adappa:user-controllable-securit:2011:kxyqv,
author = {Shruthi Adappa and Vikas Agarwal and Sunil Goyal and Ponnurangam Kumaraguru and Sumit Mittal},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Accepted at HotMobile},
title = {{User Controllable Security and Privacy for Mobile Mashups}},
url = {http://precog.iiitd.edu.in/Publications_files/SA_VA_SG_PK_SM.pdf},
year = {2011}
}
@article{agarwal:enhancing-the-rural-self-:2011:yuqfj,
author = {Vikas Agarwal and Vikram Desai and Shalini Kapoor and Ponnurangam Kumaraguru and Sumit Mittal},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {IEEE International Conference on Service Operations and Logistics, and Informatics},
title = {Enhancing the Rural Self Help Group -- Bank Linkage Program},
year = {2011}
}
@article{tatiana:we-know-where-you-live:2012:yuqfj,
author = {Tatiana Pontes and Marisa Vasconcelos and Jussara Almeida and Ponnurangam Kumaraguru and Virgilio Almeida},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {4th International Workshop on Location-Based Social Networks (LBSN 2012)},
title = {We Know Where You Live: Privacy Characterization of Foursquare Behavior},
url = {http://precog.iiitd.edu.in/Publications_files/TP_lbsn_2012.pdf},
year = {2012}
}
@article{Karat:2009:PFS:1850636.1850640,
author = {Karat, J. and Karat, C.-M. and Bertino, E. and Li, N. and Ni, Q. and Brodie, C. and Lobo, J. and Calo, S. B. and Cranor, L. F. and Kumaraguru, P. and Reeder, R. W.},
title = {Policy framework for security and privacy management},
journal = {IBM J. Res. Dev.},
issue_date = {March 2009},
volume = {53},
number = {2},
month = mar,
year = {2009},
issn = {0018-8646},
pages = {242--255},
numpages = {14},
url = {http://dl.acm.org/citation.cfm?id=1850636.1850640}
acmid = {1850640},
publisher = {IBM Corp.},
address = {Riverton, NJ, USA},
}
@article{asthana:tring-tring---an-explorat:2012:nrtys,
author = {Siddharth Asthana and Pushpendra Singh and Ponnurangam Kumaraguru and Amarjeet Singh and Vinayak Naik},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {IndiaHCI},
title = {Tring! Tring! - An Exploration and Analysis of Interactive Voice Response Systems},
url = {http://precog.iiitd.edu.in/Publications_files/IHCI_2012.pdf},
year = {2012}
}
@article{chhabra:phi.sh/ocial:-the-phishin:2011:yuqfj,
author = {Sidharth Chhabra and Anupama Aggarwal and Fabricio Benevenuto and Ponnurangam Kumaraguru},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS},
title = {{Phi.sh/\$oCiaL: The Phishing Landscape through Short URLs}},
url = {http://precog.iiitd.edu.in/Publications_files/SC_AA_FB_PK_CEAS2011.pdf},
year = {2011}
}
@article{ghai:cue-:-a-framework-for-gen:2010:kxyqv,
author = {Sunil Kumar Ghai and Prateek Nigam and Ponnurangam Kumaraguru},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {3rd ACM Workshop on Assurable and Usable Security Configuration (in conjunction with CCS 2010)},
month = {October},
title = {{Cue : A Framework for Generating Meaningful Feedback in XACML}},
year = {2010}
}
@incollection {sheedy:a-contextual-method-for:2008,
author = {Sheedy, Caroline and Kumaraguru, Ponnurangam},
affiliation = {Dublin City University, Dublin, Ireland},
title = {A Contextual Method for Evaluating Privacy Preferences},
booktitle = {Policies and Research in Identity Management (IDMAN)},
series = {IFIP International Federation for Information Processing},
publisher = {Springer Boston},
isbn = {978-0-387-77995-9},
keyword = {Computer Science},
pages = {139-146},
volume = {261},
url = {http://precog.iiitd.edu.in/Publications_files/CS_PK_final_draft.pdf},
year = {2008}
}
@article{gupta:credibility-ranking-of-tw:2012:yuqfj,
author = {Aditi Gupta and Ponnurangam Kumaraguru},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Workshop on Privacy and Security in Online Social Media, Co-located with WWW},
title = {Credibility Ranking of Tweets during High Impact Events},
url = {http://precog.iiitd.edu.in/Publications_files/a2-gupta.pdf},
year = {2012}
}
@article{rengamani:the-unique-identification-num:2010,
author = {Haricharan Rengamani and Ponnurangam Kumaraguru and Rajarishi Chakraborty and H. Raghav Rao},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {The Third International Conference on Ethics and Policy of Biometrics and International Data Sharing (ICEB)},
title = {The Unique Identification Number Project: Challenges and Recommendations},
year = {2010}
}
@article{gupta:integrating-linked-open-d:2011:yuqfj,
author = {Archit Gupta and Krishnamurthy Koduvayur Viswanathan and Anupam Joshi and Timothy Finin and Ponnurangam Kumaraguru},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {accepted at Information Integration on the Web (IIWeb), Co-located workshop at WWW},
title = {Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks},
url = {http://precog.iiitd.edu.in/Publications_files/AG_KV_AJ_TF_PK_IIWeb_WWW_2011.pdf},
year = {2011}
}
@techreport{gupta:twitter-credibility-ranki:2011:yuqfj,
author = {Aditi Gupta and Ponnurangam Kumaraguru},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
institution = {IIIT-Delhi},
number = {IIITD-TR-2011-010},
title = {{\@Twitter Credibility Ranking of Tweets on Events \#breakingnews}},
year = {2011}
}
@techreport{gupta:twitter-explodes-with-act:2011:yuqfj,
author = {Aditi Gupta and Ponnurangam Kumaraguru},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
institution = {IIIT-Delhi},
note = {precog.iiitd.edu.in/Publications\_files/AG\_PK\_TR\_2011.pdf},
title = {{Twitter Explodes with Activity in Mumbai Blasts! A Lifeline or an Unmonitored Daemon in the Lurking?}},
year = {2011}
}
@inproceedings{ion:home-is-safer-than-the-cl:2011:nrtys,
author = {Iulia Ion and Niharika Sachdeva and Ponnurangam Kumaraguru and Srdjan Capkun},
booktitle = {Symposium on Usable Privacy and Security (SOUPS)},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
title = {Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage},
url = {http://precog.iiitd.edu.in/Publications_files/a13_Sachdeva.pdf},
year = {2011}
}
@article{jain:cross-pollination-of-info:2011:nrtys,
author = {Paridhi Jain and Tiago Rodrigues and Gabriel Magno and Ponnurangam Kumaraguru and Virgilo Almeida},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Accepted at Third International Conference on Social Computing (Short paper)},
title = {Cross-Pollination of Information in Online Social Media: A Case Study on Popular Social Networks},
url = {http://precog.iiitd.edu.in/Publications_files/PJ_TR_PK_VA_SocialCom_2011.pdf},
year = {2011}
}
@article{khot:marasim:-a-novel-jigsaw-b:2011:nrtys,
author = {Rohit Khot and Srinathan Kannan and Ponnurangam Kumaraguru},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {To appear In Proceedings of the 29th ACM International Conference on Human Factors in Computing Systems. CHI.},
title = {Marasim: A Novel Jigsaw Based Authentication Scheme using Tagging},
url = {http://precog.iiitd.edu.in/Publications_files/RK_SK_PK_CHI_2011.pdf},
year = {2011}
}
@article{kuldeep-yadav:smsassassin-:-crowdsourci:2011:yuqfj,
author = {Kuldeep Yadav and Ponnurangam Kumaraguru and Atul Goyal and Ashish Gupta and Vinayak Naik},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Accepted at HotMobile},
title = {SMSAssassin : Crowdsourcing Driven Mobile-based System for SMS Spam Filtering},
url = {http://precog.iiitd.edu.in/Publications_files/KY_PK_AG_AG_VN_HotMobile_2011.pdf},
year = {2011}
}
@article{kumaraguru:a-survey-of-privacy-polic:2007:lrfkq,
author = {Ponnurangam Kumaraguru and Lorrie Cranor and Jorge Lobo and Seraphin Calo},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Workshop on Usable IT Security Management (USM '07) at Symposium On Usable Privacy and Security '07},
title = {A Survey of Privacy Policy Languages},
url = {http://precog.iiitd.edu.in/Publications_files/Privacy_Policy_Languages.pdf},
year = {2007}
}
@article{kumaraguru:anti---terrorism-in-india:2010:lrfkq,
author = {Ponnurangam Kumaraguru and Ashish Sureka},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Terrorism and New Media: Building a Research Network},
title = {Anti - Terrorism in India},
year = {2010}
}
@article{kumaraguru:anti-phishing-landing-page:2009:yuqfj,
author = {Ponnurangam Kumaraguru and Lorrie Faith Cranor and Laura Mather},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Conference on Email and Anti-Spam},
title = {Anti-phishing landing page: Turning a 404 into a teachable moment for end users},
url = {http://precog.iiitd.edu.in/Publications_files/APWGLandingPage-Turning404intoEducation.pdf},
year = {2009}
}
@article{kumaraguru:getting-users-to-pay-atte:2007:yuqfj,
author = {Ponnurangam Kumaraguru and Yong Rhee and Steve Sheng and Sharique Hasan and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {e-Crime Researchers Summit, Anti-Phishing Working Group},
title = {Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer},
url = {http://precog.iiitd.edu.in/Publications_files/PK_YR_SS_AA_LC_JH_ecrime_07.pdf},
year = {2007}
}
@inproceedings{Kumaraguru:2009:SPR:1572532.1572536,
author = {Kumaraguru, Ponnurangam and Cranshaw, Justin and Acquisti, Alessandro and Cranor, Lorrie and Hong, Jason and Blair, Mary Ann and Pham, Theodore},
title = {School of phish: a real-world evaluation of anti-phishing training},
booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security},
series = {SOUPS '09},
year = {2009},
isbn = {978-1-60558-736-3},
location = {Mountain View, California},
pages = {3:1--3:12},
articleno = {3},
numpages = {12},
url = {http://precog.iiitd.edu.in/Publications_files/a3-kumaraguru.pdf},
doi = {10.1145/1572532.1572536},
acmid = {1572536},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {email, embedded training, phishing, real-world studies, usable privacy and security},
}
@article{kumaraguru:lessons-from-a-real-world:2008:lrfkq,
author = {Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {e-Crime Researchers Summit, Anti-Phishing Working Group},
month = {October},
title = {Lessons From a Real World Evaluation of Anti-Phishing Training},
url = {http://precog.iiitd.edu.in/Publications_files/eCrime_APWG_08.pdf},
year = {2008}
}
@phdthesis{kumaraguru:phishguru:-a-system-for-e:2009:rcrwd,
author = {Ponnurangam Kumaraguru},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
note = {http://reports-archive.adm.cs.cmu.edu/anon/isr2009/abstracts/09-106.html},
school = {{School of Computer Science, Carnegie Mellon University}},
title = {PhishGuru: A System for Educating Users about Semantic Attacks},
year = {2009}
}
@inproceedings{kumaraguru:privacy-in-india:-attitud:2030:lrfkq,
author = {Ponnurangam Kumaraguru and Lorrie Cranor},
booktitle = {Proceedings of the 2005 Workshop on Privacy Enhancing Technologies (PET2005)},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Lecture Notes in Computer Science. Springer Verlag},
location = {Dubrovnik, Croatia},
title = {{Privacy in India: Attitudes and Awareness}},
url = {http://precog.iiitd.edu.in/Publications_files/pk_lc_PET_2005.pdf},
year = {30 May - 1 June 2005}
}
@techreport{kumaraguru:privacy-indexes:-a-survey:2005:lrfkq,
author = {Ponnurangam Kumaraguru and Lorrie Faith Cranor},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
institution = {Carnegie Mellon University},
title = {Privacy Indexes: A Survey of Westin's Studies.},
year = {2005}
}
@article{kumaraguru:privacy-perceptions-in-in:2005:lrfkq,
author = {Ponnurangam Kumaraguru and Lorrie Faith Cranor and Elaine Newton},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {In The 33rd Research Conference on Communication, Information and Internet Policy (TPRC)},
month = {September},
read = {Yes},
title = {Privacy Perceptions in India and the United States: An Interview Study},
url = {http://precog.iiitd.edu.in/Publications_files/tprc_2005_pk_lc_en.pdf},
year = {2005}
}
@inproceedings{kumaraguru:protecting-people-from-ph:2007:lrfkq,
author = {Ponnurangam Kumaraguru and Yong Rhee and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong and Elizabeth Nunge},
booktitle = {CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
doi = {http://doi.acm.org/10.1145/1240624.1240760},
isbn = {978-1-59593-593-9},
location = {San Jose, California, USA},
pages = {905--914},
title = {Protecting people from phishing: the design and evaluation of an embedded training email system},
year = {2007},
url = {http://precog.iiitd.edu.in/Publications_files/chi2007-embedded-training-final.pdf}
}
@techreport{kumaraguru:teaching-johnny-not-to-fa:2007:lrfkq,
author = {Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
institution = {Cranegie Mellon University},
note = {http://www.cylab.cmu.edu/files/cmucylab07003.pdf},
title = {Teaching Johnny Not to Fall for Phish},
year = {2007a}
}
@conference{kumaragurutrustmodeling:2006,
author = {Ponnurangam Kumaraguru and Alessandro Acquisti and Lorrie Cranor},
booktitle = {Privacy Security Trust},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
title = {{Trust modeling for online transactions: A phishing scenario}},
url = {http://precog.iiitd.edu.in/Publications_files/pk_aa_lc_pst_2006.pdf},
year = {2006}
}
@article{malhotra:studying-user-footprints-:2012:yuqfj,
author = {Anshu Malhotra and Luam Totti and Wagner Meira and Ponnurangam Kumaraguru and Virgilio Almeida},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {{Accepted at International Workshop on Cybersecurity of Online Social Network (CSOSN)}},
title = {Studying User Footprints in Different Online Social Networks},
url = {http://precog.iiitd.edu.in/Publications_files/asonam.pdf},
year = {2012}
}
@article{ponnurangam-kumaraguru:protecting-senior-citizen:2010:lrfkq,
author = {Ponnurangam Kumaraguru and Shambhu Upadhyaya and Raghav Rao},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {6th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW), Oakridge, TN},
title = {Protecting Senior Citizens from Cyber Security Attacks in the e-Health Scenario: An International Perspective},
year = {2010}
}
@article{kumaraguru:anti-phishing-education:2008:lrfkq,
author = {Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {The Proceedings of The International Conference on E-Learning in the Workplace (ICELW)},
title = {Anti-Phishing Education},
year = {2008}
}
@article{diesner:mental-models-of-data-priv:2005:lrfkq,
author = {Jana Diesner and Ponnurangam Kumaraguru and Kathleen M. Carley},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {55th Annual Conference of the International Communication Association (ICA), New York},
title = {Mental Models of Data Privacy and Security Extracted from Interviews with Indians},
url = {http://precog.iiitd.edu.in/Publications_files/diesner_kumaraguru.pdf},
year = {May 26-30, 2005}
}
@article{rauber:privacy-albeit-late:2011:yuqfj,
author = {Gustavo Rauber and Virgilio Almeida and Ponnurangam Kumaraguru},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Accepted at WEBMEDIA, Brazilian Symposium on Multimedia and the Web},
title = {{Privacy Albeit Late}},
url = {http://precog.iiitd.edu.in/Publications_files/GR_VA_PK_SMW_2011.pdf},
year = {2011}
}
@techreport{serge_pk_dimacs_report,
address = {Retrieved June 18, 2005, http://www-2.cs.cmu.edu/~ponguru/dimacsrpt.pdf},
author = {Serge Egelman and Ponnurangam Kumaraguru},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Rutgers University, USA},
location = {USA},
title = {{Report on DIMACS Workshop and Working Group Meeting on Usable Privacy and Security Software}},
year = {2004}
}
@inproceedings{sheng:anti-phishing-phil:-the-d:2007:yuqfj,
author = {Steve Sheng and Bryant Magnien and Ponnurangam Kumaraguru and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong and Elizabeth Nunge},
booktitle = {SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
doi = {http://doi.acm.org/10.1145/1280680.1280692},
isbn = {978-1-59593-801-5},
keywords = {game},
location = {Pittsburgh, Pennsylvania},
pages = {88--99},
title = {Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish},
year = {2007},
url = {http://precog.iiitd.edu.in/Publications_files/Sheng-interview-ecrime09.pdf}
}
@article{sheng:improving-phishing-counte:2009:lrfkq,
author = {Steve Sheng and Ponnurangam Kumaraguru and Alessandro Acquisti and Lorrie Cranor and Jason Hong},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {APWG eCrime Researchers Summit},
title = {Improving Phishing Countermeasures: An Analysis of Expert Interviews},
url = {http://precog.iiitd.edu.in/Publications_files/Sheng-interview-ecrime09.pdf},
year = {2009}
}
@inproceedings{sheng:who-falls-for-phish:-a-de:2010:lrfkq,
acmid = {1753383},
address = {New York, NY, USA},
author = {Sheng, Steve and Holbrook, Mandy and Kumaraguru, Ponnurangam and Cranor, Lorrie Faith and Downs, Julie},
booktitle = {Proceedings of the 28th international conference on Human factors in computing systems},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
doi = {http://doi.acm.org/10.1145/1753326.1753383},
isbn = {978-1-60558-929-9},
keywords = {mechanical turk, phishing, roleplay, social engineering, survey, user behavior},
location = {Atlanta, Georgia, USA},
numpages = {10},
pages = {373--382},
publisher = {ACM},
series = {CHI '10},
title = {Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions},
url = {http://precog.iiitd.edu.in/Publications_files/pap1162-sheng.pdf},
year = {2010},
bdsk-url-1 = {http://doi.acm.org/10.1145/1753326.1753383}
}
@article{sureka:mining-youtube-to-discove:2010:nrtys,
author = {Ashish Sureka and Ponnurangam Kumaraguru and Atul Goyal and Sidharth Chhabra},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Accepted at Sixth Asia Information Retrieval Societies Conference},
title = {{Mining YouTube to Discover Hate Videos, Users and Hidden Communities}},
url = {http://precog.iiitd.edu.in/Publications_files/AS_PK_AG_SC_AIRS-2010.pdf},
year = {2010}
}
@article{teaching:johnny:jounal:underreview,
author = {Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Cranor and Jason Hong},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {ACM Transactions on Internet Technology (TOIT)},
number = {2},
title = {Teaching Johnny not to fall for phish},
volume = {10},
year = {2010}
}
@article{yadav:challenges-and-novelties-while:2010,
author = {Kuldeep Yadav and Vinayak Naik and Amarjeet Singh and Pushpendra Singh and Ponnurangam Kumaraguru and Umesh Chandra},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {ACM Workshop on Networked Systems for Developing Regions},
title = {Short Paper: Challenges and Novelties while using Mobile Phones as ICT Devices for Indian Masses},
url = {http://precog.iiitd.edu.in/Publications_files/nsdr10_short02.pdf},
year = {2010}
}
@article{ion:influence-of-user-perception:2010,
authors = {Iulia Ion and Marc Langheinrich and Ponnurangam Kumaraguru and Srdjan Capkun},
date-added = {2012-07-13 19:23:56 +0100},
date-modified = {2012-07-13 19:23:56 +0100},
journal = {Symposium On Usable Privacy and Security (SOUPS)},
title = {Influence of User Perception, Security Needs, and Social Factors on Device Pairing Method Choices},
url = {http://precog.iiitd.edu.in/Publications_files/a6_ion.pdf},
year = {2010}
}
@article{pontes:beware-of-what-you-share::2012:yuqfj,
Author = {Tatiana Pontes and Gabriel Magno and Marisa Vasconcelos and
Aditi Gupta and Jussara Almeida and Ponnurangam Kumaraguru and
Virgilio Almeida},
Date-Added = {2012-10-15 15:04:39 +0530},
Date-Modified = {2012-10-15 15:07:09 +0530},
Journal = {{Accepted at Privacy in Social Data (PinSoda), in
conjunction with International Conference on Data Mining (ICDM)} },
Title = {{Beware of What You Share: Inferring Home Location in Social
Networks}},
Year = {2012 }
}
@techreport{kumaraguru:privacy-in-india:-attitud:2012:yuqfj,
Author = {Ponnurangam Kumaraguru and Niharika Sachdeva},
Institution = {{Precog-TR-12-001, Precog@IIIT-Delhi}},
Note = {http://precog.iiitd.edu.in/research/privacyindia/},
Title = {{Privacy in India: Attitudes and Awareness V 2.0}},
Year = {2012}}
@article{jainkumaraguru:finding-nemo:2012,
author = {Paridhi Jain and Ponnurangam Kumaraguru},
date-added = {2012-12-26 19:23:56 +0100},
title = {Finding Nemo: Searching and Resolving Identities of Users Across Online Social Networks},
booktitle={TR-Report, 2012},
url={http://arxiv.org/pdf/1212.6147v1.pdf},
year = {2012},
}
@article{dewanguptakumaraguru:chamaileon:2012,
author = {Prateek Dewan and Mayank Gupta and Ponnurangam Kumaraguru},
date-added = {2012-03-15 19:23:56 +0100},
title = {ChaMAILeon: Simplified email sharing like never before},
booktitle={IIITD-TR-2012-003},
url={http://precog.iiitd.edu.in/Publications_files/PD_Chamaileon_TR.pdf},
year = {2012},
}
@article{panjwanighoshkumaraguru:transaction-receipts:2012,
author = {Saurabh Panjwani and Mohona Ghosh and Ponnurangam Kumaraguru and Soumya Vardhan Singh},
date-added = {2012-03-15 19:23:56 +0100},
title = {Securing the Uncharted Territory: Transaction Receipts in Branchless Banking},
booktitle={IIITD-TR-2012-008},
url={http://precog.iiitd.edu.in/Publications_files/SP_TransReceipts_TR.pdf},
year = {2012},
}
@article{yadavmalhotrakumaraguru:take-control-over-your-smss:2012,
author = {Kuldeep Yadav and Anshu Malhotra and Ponnurangam Kumaraguru and Rushil Khurana and Dipesh Kr. Singh},
date-added = {2012-03-15 19:23:56 +0100},
title = {Take Control Over your SMSes: A Real-World Evaluation of a Mobile-based SpamSMS Filtering System},
booktitle={IIITD-TR-2012-007},
url={http://precog.iiitd.edu.in/Publications_files/KY_SMSAssassin_TR.pdf},
year = {2012},
}
@INPROCEEDINGS{jain:Iseekfbme:2013:wole,
author = {Paridhi Jain, Ponnurangam Kumaraguru and Anupam Joshi},
title = {@I seek 'fb.me': Identifying Users across Multiple Online Social Networks},
booktitle = {International Workshop on Web of Linked Entities, Co-located with WWW},
url={http://precog.iiitd.edu.in/Publications_files/19wole01-jain.pdf},
series={WoLE},
year = {2013},
}
@article{dewan2013multiosn,
Author = {Dewan, P., and Gupta, M., and Goyal, K., and Kumaraguru, P.},
Date-Added = {2013-05-18 15:10:26 +0000},
Date-Modified = {2013-05-18 15:12:43 +0000},
Journal = {Precog Technical report - Precog-TR-13-001},
Pages = {10},
Title = {MultiOSN: Monitoring Multiple Online Social Media During Real-World Events},
Url = {http://precog.iiitd.edu.in/Publications_files/MultiOSN_TR_2013.pdf},
Year = {2013}}
@inproceedings{Lerman13society,
keywords = {social-networks},
booktitle = {Proceedings of International Conference on Social Intelligence and Technology (SOCIETY)},
year = {2013},
title = {Limited Attention and Centrality in Social Networks},
author = {Kristina Lerman and Prachi Jain and Rumi Ghosh and Jeon-Hyung Kang and Ponnurangam Kumaraguru},
}
@article{DBLP:journals/corr/GuptaK13,
author = {Srishti Gupta and
Ponnurangam Kumaraguru},
title = {OCEAN: Open-source Collation of eGovernment data And Networks
- Understanding Privacy Leaks in Open Government Data},
journal = {CoRR},
volume = {abs/1312.2784},
year = {2013},
ee = {http://arxiv.org/abs/1312.2784},
bibsource = {DBLP, http://dblp.uni-trier.de}
}