Precog - Bibliography of publications

@article{adappa:user-controllable-securit:2011:kxyqv,
  author = {Shruthi Adappa and Vikas Agarwal and Sunil Goyal and Ponnurangam Kumaraguru and Sumit Mittal},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Accepted at HotMobile},
  title = {{User Controllable Security and Privacy for Mobile Mashups}},
  url = {http://precog.iiitd.edu.in/Publications_files/SA_VA_SG_PK_SM.pdf},
  year = {2011}
}

@article{agarwal:enhancing-the-rural-self-:2011:yuqfj,
  author = {Vikas Agarwal and Vikram Desai and Shalini Kapoor and Ponnurangam Kumaraguru and Sumit Mittal},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {IEEE International Conference on Service Operations and Logistics, and Informatics},
  title = {Enhancing the Rural Self Help Group -- Bank Linkage Program},
  year = {2011}
}

@article{tatiana:we-know-where-you-live:2012:yuqfj,
  author = {Tatiana Pontes and Marisa Vasconcelos and Jussara Almeida and Ponnurangam Kumaraguru and Virgilio Almeida},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {4th International Workshop on Location-Based Social Networks (LBSN 2012)},
  title = {We Know Where You Live: Privacy Characterization of Foursquare Behavior},
  url = {http://precog.iiitd.edu.in/Publications_files/TP_lbsn_2012.pdf},
  year = {2012}
}

@article{Karat:2009:PFS:1850636.1850640,
 author = {Karat, J. and Karat, C.-M. and Bertino, E. and Li, N. and Ni, Q. and Brodie, C. and Lobo, J. and Calo, S. B. and Cranor, L. F. and Kumaraguru, P. and Reeder, R. W.},
 title = {Policy framework for security and privacy management},
 journal = {IBM J. Res. Dev.},
 issue_date = {March 2009},
 volume = {53},
 number = {2},
 month = mar,
 year = {2009},
 issn = {0018-8646},
 pages = {242--255},
 numpages = {14},
 url = {http://dl.acm.org/citation.cfm?id=1850636.1850640}
 acmid = {1850640},
 publisher = {IBM Corp.},
 address = {Riverton, NJ, USA},
}

@article{asthana:tring-tring---an-explorat:2012:nrtys,
  author = {Siddharth Asthana and Pushpendra Singh and Ponnurangam Kumaraguru and Amarjeet Singh and Vinayak Naik},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {IndiaHCI},
  title = {Tring! Tring! - An Exploration and Analysis of Interactive Voice Response Systems},
  url = {http://precog.iiitd.edu.in/Publications_files/IHCI_2012.pdf},
  year = {2012}
}

@article{chhabra:phi.sh/ocial:-the-phishin:2011:yuqfj,
  author = {Sidharth Chhabra and Anupama Aggarwal and Fabricio Benevenuto and Ponnurangam Kumaraguru},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS},
  title = {{Phi.sh/\$oCiaL: The Phishing Landscape through Short URLs}},
  url = {http://precog.iiitd.edu.in/Publications_files/SC_AA_FB_PK_CEAS2011.pdf},
  year = {2011}
}

@article{ghai:cue-:-a-framework-for-gen:2010:kxyqv,
  author = {Sunil Kumar Ghai and Prateek Nigam and Ponnurangam Kumaraguru},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {3rd ACM Workshop on Assurable and Usable Security Configuration (in conjunction with CCS 2010)},
  month = {October},
  title = {{Cue : A Framework for Generating Meaningful Feedback in XACML}},
  year = {2010}
}

@incollection {sheedy:a-contextual-method-for:2008,
   author = {Sheedy, Caroline and Kumaraguru, Ponnurangam},
   affiliation = {Dublin City University, Dublin, Ireland},
   title = {A Contextual Method for Evaluating Privacy Preferences},
   booktitle = {Policies and Research in Identity Management (IDMAN)},
   series = {IFIP International Federation for Information Processing},
   publisher = {Springer Boston},
   isbn = {978-0-387-77995-9},
   keyword = {Computer Science},
   pages = {139-146},
   volume = {261},
   url = {http://precog.iiitd.edu.in/Publications_files/CS_PK_final_draft.pdf},
   year = {2008}
}

@article{gupta:credibility-ranking-of-tw:2012:yuqfj,
  author = {Aditi Gupta and Ponnurangam Kumaraguru},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Workshop on Privacy and Security in Online Social Media, Co-located with WWW},
  title = {Credibility Ranking of Tweets during High Impact Events},
  url = {http://precog.iiitd.edu.in/Publications_files/a2-gupta.pdf},
  year = {2012}
}

@article{rengamani:the-unique-identification-num:2010,
  author = {Haricharan Rengamani and Ponnurangam Kumaraguru and Rajarishi Chakraborty and H. Raghav Rao},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {The Third International Conference on Ethics and Policy of Biometrics and International Data Sharing (ICEB)},
  title = {The Unique Identification Number Project: Challenges and Recommendations},
  year = {2010}
}

@article{gupta:integrating-linked-open-d:2011:yuqfj,
  author = {Archit Gupta and Krishnamurthy Koduvayur Viswanathan and Anupam Joshi and Timothy Finin and Ponnurangam Kumaraguru},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {accepted at Information Integration on the Web (IIWeb), Co-located workshop at WWW},
  title = {Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks},
  url = {http://precog.iiitd.edu.in/Publications_files/AG_KV_AJ_TF_PK_IIWeb_WWW_2011.pdf},
  year = {2011}
}

@techreport{gupta:twitter-credibility-ranki:2011:yuqfj,
  author = {Aditi Gupta and Ponnurangam Kumaraguru},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  institution = {IIIT-Delhi},
  number = {IIITD-TR-2011-010},
  title = {{\@Twitter Credibility Ranking of Tweets on Events \#breakingnews}},
  year = {2011}
}

@techreport{gupta:twitter-explodes-with-act:2011:yuqfj,
  author = {Aditi Gupta and Ponnurangam Kumaraguru},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  institution = {IIIT-Delhi},
  note = {precog.iiitd.edu.in/Publications\_files/AG\_PK\_TR\_2011.pdf},
  title = {{Twitter Explodes with Activity in Mumbai Blasts! A Lifeline or an Unmonitored Daemon in the Lurking?}},
  year = {2011}
}

@inproceedings{ion:home-is-safer-than-the-cl:2011:nrtys,
  author = {Iulia Ion and Niharika Sachdeva and Ponnurangam Kumaraguru and Srdjan Capkun},
  booktitle = {Symposium on Usable Privacy and Security (SOUPS)},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  title = {Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage},
  url = {http://precog.iiitd.edu.in/Publications_files/a13_Sachdeva.pdf},
  year = {2011}
}

@article{jain:cross-pollination-of-info:2011:nrtys,
  author = {Paridhi Jain and Tiago Rodrigues and Gabriel Magno and Ponnurangam Kumaraguru and Virgilo Almeida},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Accepted at Third International Conference on Social Computing (Short paper)},
  title = {Cross-Pollination of Information in Online Social Media: A Case Study on Popular Social Networks},
  url = {http://precog.iiitd.edu.in/Publications_files/PJ_TR_PK_VA_SocialCom_2011.pdf},
  year = {2011}
}

@article{khot:marasim:-a-novel-jigsaw-b:2011:nrtys,
  author = {Rohit Khot and Srinathan Kannan and Ponnurangam Kumaraguru},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {To appear In Proceedings of the 29th ACM International Conference on Human Factors in Computing Systems. CHI.},
  title = {Marasim: A Novel Jigsaw Based Authentication Scheme using Tagging},
  url = {http://precog.iiitd.edu.in/Publications_files/RK_SK_PK_CHI_2011.pdf},
  year = {2011}
}

@article{kuldeep-yadav:smsassassin-:-crowdsourci:2011:yuqfj,
  author = {Kuldeep Yadav and Ponnurangam Kumaraguru and Atul Goyal and Ashish Gupta and Vinayak Naik},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Accepted at HotMobile},
  title = {SMSAssassin : Crowdsourcing Driven Mobile-based System for SMS Spam Filtering},
  url = {http://precog.iiitd.edu.in/Publications_files/KY_PK_AG_AG_VN_HotMobile_2011.pdf},
  year = {2011}
}

@article{kumaraguru:a-survey-of-privacy-polic:2007:lrfkq,
  author = {Ponnurangam Kumaraguru and Lorrie Cranor and Jorge Lobo and Seraphin Calo},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Workshop on Usable IT Security Management (USM '07) at Symposium On Usable Privacy and Security '07},
  title = {A Survey of Privacy Policy Languages},
  url = {http://precog.iiitd.edu.in/Publications_files/Privacy_Policy_Languages.pdf},
  year = {2007}
}

@article{kumaraguru:anti---terrorism-in-india:2010:lrfkq,
  author = {Ponnurangam Kumaraguru and Ashish Sureka},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Terrorism and New Media: Building a Research Network},
  title = {Anti - Terrorism in India},
  year = {2010}
}

@article{kumaraguru:anti-phishing-landing-page:2009:yuqfj,
  author = {Ponnurangam Kumaraguru and Lorrie Faith Cranor and Laura Mather},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Conference on Email and Anti-Spam},
  title = {Anti-phishing landing page: Turning a 404 into a teachable moment for end users},
  url = {http://precog.iiitd.edu.in/Publications_files/APWGLandingPage-Turning404intoEducation.pdf},
  year = {2009}
}

@article{kumaraguru:getting-users-to-pay-atte:2007:yuqfj,
  author = {Ponnurangam Kumaraguru and Yong Rhee and Steve Sheng and Sharique Hasan and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {e-Crime Researchers Summit, Anti-Phishing Working Group},
  title = {Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer},
  url = {http://precog.iiitd.edu.in/Publications_files/PK_YR_SS_AA_LC_JH_ecrime_07.pdf},
  year = {2007}
}

@inproceedings{Kumaraguru:2009:SPR:1572532.1572536,
 author = {Kumaraguru, Ponnurangam and Cranshaw, Justin and Acquisti, Alessandro and Cranor, Lorrie and Hong, Jason and Blair, Mary Ann and Pham, Theodore},
 title = {School of phish: a real-world evaluation of anti-phishing training},
 booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security},
 series = {SOUPS '09},
 year = {2009},
 isbn = {978-1-60558-736-3},
 location = {Mountain View, California},
 pages = {3:1--3:12},
 articleno = {3},
 numpages = {12},
 url = {http://precog.iiitd.edu.in/Publications_files/a3-kumaraguru.pdf},
 doi = {10.1145/1572532.1572536},
 acmid = {1572536},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {email, embedded training, phishing, real-world studies, usable privacy and security},
} 

@article{kumaraguru:lessons-from-a-real-world:2008:lrfkq,
  author = {Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {e-Crime Researchers Summit, Anti-Phishing Working Group},
  month = {October},
  title = {Lessons From a Real World Evaluation of Anti-Phishing Training},
  url = {http://precog.iiitd.edu.in/Publications_files/eCrime_APWG_08.pdf},
  year = {2008}
}

@phdthesis{kumaraguru:phishguru:-a-system-for-e:2009:rcrwd,
  author = {Ponnurangam Kumaraguru},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  note = {http://reports-archive.adm.cs.cmu.edu/anon/isr2009/abstracts/09-106.html},
  school = {{School of Computer Science, Carnegie Mellon University}},
  title = {PhishGuru: A System for Educating Users about Semantic Attacks},
  year = {2009}
}

@inproceedings{kumaraguru:privacy-in-india:-attitud:2030:lrfkq,
  author = {Ponnurangam Kumaraguru and Lorrie Cranor},
  booktitle = {Proceedings of the 2005 Workshop on Privacy Enhancing Technologies (PET2005)},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Lecture Notes in Computer Science. Springer Verlag},
  location = {Dubrovnik, Croatia},
  title = {{Privacy in India: Attitudes and Awareness}},
  url = {http://precog.iiitd.edu.in/Publications_files/pk_lc_PET_2005.pdf},
  year = {30 May - 1 June 2005}
}

@techreport{kumaraguru:privacy-indexes:-a-survey:2005:lrfkq,
  author = {Ponnurangam Kumaraguru and Lorrie Faith Cranor},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  institution = {Carnegie Mellon University},
  title = {Privacy Indexes: A Survey of Westin's Studies.},
  year = {2005}
}

@article{kumaraguru:privacy-perceptions-in-in:2005:lrfkq,
  author = {Ponnurangam Kumaraguru and Lorrie Faith Cranor and Elaine Newton},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {In The 33rd Research Conference on Communication, Information and Internet Policy (TPRC)},
  month = {September},
  read = {Yes},
  title = {Privacy Perceptions in India and the United States: An Interview Study},
  url = {http://precog.iiitd.edu.in/Publications_files/tprc_2005_pk_lc_en.pdf},
  year = {2005}
}

@inproceedings{kumaraguru:protecting-people-from-ph:2007:lrfkq,
  author = {Ponnurangam Kumaraguru and Yong Rhee and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong and Elizabeth Nunge},
  booktitle = {CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  doi = {http://doi.acm.org/10.1145/1240624.1240760},
  isbn = {978-1-59593-593-9},
  location = {San Jose, California, USA},
  pages = {905--914},
  title = {Protecting people from phishing: the design and evaluation of an embedded training email system},
  year = {2007},
  url = {http://precog.iiitd.edu.in/Publications_files/chi2007-embedded-training-final.pdf}
}

@techreport{kumaraguru:teaching-johnny-not-to-fa:2007:lrfkq,
  author = {Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  institution = {Cranegie Mellon University},
  note = {http://www.cylab.cmu.edu/files/cmucylab07003.pdf},
  title = {Teaching Johnny Not to Fall for Phish},
  year = {2007a}
}

@conference{kumaragurutrustmodeling:2006,
  author = {Ponnurangam Kumaraguru and Alessandro Acquisti and Lorrie Cranor},
  booktitle = {Privacy Security Trust},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  title = {{Trust modeling for online transactions: A phishing scenario}},
  url = {http://precog.iiitd.edu.in/Publications_files/pk_aa_lc_pst_2006.pdf},
  year = {2006}
}

@article{malhotra:studying-user-footprints-:2012:yuqfj,
  author = {Anshu Malhotra and Luam Totti and Wagner Meira and Ponnurangam Kumaraguru and Virgilio Almeida},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {{Accepted at International Workshop on Cybersecurity of Online Social Network (CSOSN)}},
  title = {Studying User Footprints in Different Online Social Networks},
  url = {http://precog.iiitd.edu.in/Publications_files/asonam.pdf},
  year = {2012}
}

@article{ponnurangam-kumaraguru:protecting-senior-citizen:2010:lrfkq,
  author = {Ponnurangam Kumaraguru and Shambhu Upadhyaya and Raghav Rao},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {6th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW), Oakridge, TN},
  title = {Protecting Senior Citizens from Cyber Security Attacks in the e-Health Scenario: An International Perspective},
  year = {2010}
}

@article{kumaraguru:anti-phishing-education:2008:lrfkq,
  author = {Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {The Proceedings of The International Conference on E-Learning in the Workplace (ICELW)},
  title = {Anti-Phishing Education},
  year = {2008}
}

@article{diesner:mental-models-of-data-priv:2005:lrfkq,
  author = {Jana Diesner and Ponnurangam Kumaraguru and Kathleen M. Carley},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {55th Annual Conference of the International Communication Association (ICA), New York},
  title = {Mental Models of Data Privacy and Security Extracted from Interviews with Indians},
  url = {http://precog.iiitd.edu.in/Publications_files/diesner_kumaraguru.pdf},
  year = {May 26-30, 2005}
}

@article{rauber:privacy-albeit-late:2011:yuqfj,
  author = {Gustavo Rauber and Virgilio Almeida and Ponnurangam Kumaraguru},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Accepted at WEBMEDIA, Brazilian Symposium on Multimedia and the Web},
  title = {{Privacy Albeit Late}},
  url = {http://precog.iiitd.edu.in/Publications_files/GR_VA_PK_SMW_2011.pdf},
  year = {2011}
}

@techreport{serge_pk_dimacs_report,
  address = {Retrieved June 18, 2005, http://www-2.cs.cmu.edu/~ponguru/dimacsrpt.pdf},
  author = {Serge Egelman and Ponnurangam Kumaraguru},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Rutgers University, USA},
  location = {USA},
  title = {{Report on DIMACS Workshop and Working Group Meeting on Usable Privacy and Security Software}},
  year = {2004}
}

@inproceedings{sheng:anti-phishing-phil:-the-d:2007:yuqfj,
  author = {Steve Sheng and Bryant Magnien and Ponnurangam Kumaraguru and Alessandro Acquisti and Lorrie Faith Cranor and Jason Hong and Elizabeth Nunge},
  booktitle = {SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  doi = {http://doi.acm.org/10.1145/1280680.1280692},
  isbn = {978-1-59593-801-5},
  keywords = {game},
  location = {Pittsburgh, Pennsylvania},
  pages = {88--99},
  title = {Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish},
  year = {2007},
  url = {http://precog.iiitd.edu.in/Publications_files/Sheng-interview-ecrime09.pdf}
}

@article{sheng:improving-phishing-counte:2009:lrfkq,
  author = {Steve Sheng and Ponnurangam Kumaraguru and Alessandro Acquisti and Lorrie Cranor and Jason Hong},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {APWG eCrime Researchers Summit},
  title = {Improving Phishing Countermeasures: An Analysis of Expert Interviews},
  url = {http://precog.iiitd.edu.in/Publications_files/Sheng-interview-ecrime09.pdf},
  year = {2009}
}

@inproceedings{sheng:who-falls-for-phish:-a-de:2010:lrfkq,
  acmid = {1753383},
  address = {New York, NY, USA},
  author = {Sheng, Steve and Holbrook, Mandy and Kumaraguru, Ponnurangam and Cranor, Lorrie Faith and Downs, Julie},
  booktitle = {Proceedings of the 28th international conference on Human factors in computing systems},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  doi = {http://doi.acm.org/10.1145/1753326.1753383},
  isbn = {978-1-60558-929-9},
  keywords = {mechanical turk, phishing, roleplay, social engineering, survey, user behavior},
  location = {Atlanta, Georgia, USA},
  numpages = {10},
  pages = {373--382},
  publisher = {ACM},
  series = {CHI '10},
  title = {Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions},
  url = {http://precog.iiitd.edu.in/Publications_files/pap1162-sheng.pdf},
  year = {2010},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1753326.1753383}
}

@article{sureka:mining-youtube-to-discove:2010:nrtys,
  author = {Ashish Sureka and Ponnurangam Kumaraguru and Atul Goyal and Sidharth Chhabra},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Accepted at Sixth Asia Information Retrieval Societies Conference},
  title = {{Mining YouTube to Discover Hate Videos, Users and Hidden Communities}},
  url = {http://precog.iiitd.edu.in/Publications_files/AS_PK_AG_SC_AIRS-2010.pdf},
  year = {2010}
}

@article{teaching:johnny:jounal:underreview,
  author = {Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Cranor and Jason Hong},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {ACM Transactions on Internet Technology (TOIT)},
  number = {2},
  title = {Teaching Johnny not to fall for phish},
  volume = {10},
  year = {2010}
}

@article{yadav:challenges-and-novelties-while:2010,
  author = {Kuldeep Yadav and Vinayak Naik and Amarjeet Singh and Pushpendra Singh and Ponnurangam Kumaraguru and Umesh Chandra},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {ACM Workshop on Networked Systems for Developing Regions},
  title = {Short Paper: Challenges and Novelties while using Mobile Phones as ICT Devices for Indian Masses},
  url = {http://precog.iiitd.edu.in/Publications_files/nsdr10_short02.pdf},
  year = {2010}
}

@article{ion:influence-of-user-perception:2010,
  authors = {Iulia Ion and Marc Langheinrich and Ponnurangam Kumaraguru and Srdjan Capkun},
  date-added = {2012-07-13 19:23:56 +0100},
  date-modified = {2012-07-13 19:23:56 +0100},
  journal = {Symposium On Usable Privacy and Security (SOUPS)},
  title = {Influence of User Perception, Security Needs, and Social Factors on Device Pairing Method Choices},
  url = {http://precog.iiitd.edu.in/Publications_files/a6_ion.pdf},
  year = {2010}
}

@article{pontes:beware-of-what-you-share::2012:yuqfj,
        Author = {Tatiana Pontes and Gabriel Magno and Marisa Vasconcelos and
Aditi Gupta and Jussara Almeida and Ponnurangam Kumaraguru and
Virgilio Almeida},
        Date-Added = {2012-10-15 15:04:39 +0530},
        Date-Modified = {2012-10-15 15:07:09 +0530},
        Journal = {{Accepted at Privacy in Social Data (PinSoda), in
conjunction with International Conference on Data Mining (ICDM)} },
        Title = {{Beware of What You Share: Inferring Home Location in Social
Networks}},
        Year = {2012 }
}

@techreport{kumaraguru:privacy-in-india:-attitud:2012:yuqfj,
Author = {Ponnurangam Kumaraguru and Niharika Sachdeva},
Institution = {{Precog-TR-12-001, Precog@IIIT-Delhi}},
Note = {http://precog.iiitd.edu.in/research/privacyindia/},
Title = {{Privacy in India: Attitudes and Awareness V 2.0}},
Year = {2012}}
    

@article{jainkumaraguru:finding-nemo:2012,
  author = {Paridhi Jain and Ponnurangam Kumaraguru},
  date-added = {2012-12-26 19:23:56 +0100},
  title = {Finding Nemo: Searching and Resolving Identities of Users Across Online Social Networks},
  booktitle={TR-Report, 2012},
  url={http://arxiv.org/pdf/1212.6147v1.pdf},
  year = {2012},
}

@article{dewanguptakumaraguru:chamaileon:2012,
  author = {Prateek Dewan and Mayank Gupta and Ponnurangam Kumaraguru},
  date-added = {2012-03-15 19:23:56 +0100},
  title = {ChaMAILeon: Simplified email sharing like never before},
  booktitle={IIITD-TR-2012-003},
  url={http://precog.iiitd.edu.in/Publications_files/PD_Chamaileon_TR.pdf},
  year = {2012},
}

@article{panjwanighoshkumaraguru:transaction-receipts:2012,
  author = {Saurabh Panjwani and Mohona Ghosh and Ponnurangam Kumaraguru and Soumya Vardhan Singh},
  date-added = {2012-03-15 19:23:56 +0100},
  title = {Securing the Uncharted Territory: Transaction Receipts in Branchless Banking},
  booktitle={IIITD-TR-2012-008},
  url={http://precog.iiitd.edu.in/Publications_files/SP_TransReceipts_TR.pdf},
  year = {2012},
}

@article{yadavmalhotrakumaraguru:take-control-over-your-smss:2012,
  author = {Kuldeep Yadav and Anshu Malhotra and Ponnurangam Kumaraguru and Rushil Khurana and Dipesh Kr. Singh},
  date-added = {2012-03-15 19:23:56 +0100},
  title = {Take Control Over your SMSes: A Real-World Evaluation of a Mobile-based SpamSMS Filtering System},
  booktitle={IIITD-TR-2012-007},
  url={http://precog.iiitd.edu.in/Publications_files/KY_SMSAssassin_TR.pdf},
  year = {2012},
}

@INPROCEEDINGS{jain:Iseekfbme:2013:wole,
    author = {Paridhi Jain, Ponnurangam Kumaraguru and Anupam Joshi},
    title = {@I seek 'fb.me': Identifying Users across Multiple Online Social Networks},
    booktitle = {International Workshop on Web of Linked Entities, Co-located with WWW},
    url={http://precog.iiitd.edu.in/Publications_files/19wole01-jain.pdf},
    series={WoLE},
    year = {2013},
  
}

@article{dewan2013multiosn,
        Author = {Dewan, P., and Gupta, M., and Goyal, K., and Kumaraguru, P.},
        Date-Added = {2013-05-18 15:10:26 +0000},
        Date-Modified = {2013-05-18 15:12:43 +0000},
        Journal = {Precog Technical report - Precog-TR-13-001},
        Pages = {10},
        Title = {MultiOSN: Monitoring Multiple Online Social Media During Real-World Events},
        Url = {http://precog.iiitd.edu.in/Publications_files/MultiOSN_TR_2013.pdf},
        Year = {2013}}

@inproceedings{Lerman13society,
  keywords = {social-networks},
  booktitle = {Proceedings of International Conference on Social Intelligence and Technology (SOCIETY)},
  year = {2013},
  title = {Limited Attention and Centrality in Social Networks},
  author = {Kristina Lerman and Prachi Jain and Rumi Ghosh and Jeon-Hyung Kang and Ponnurangam Kumaraguru},
}

@article{DBLP:journals/corr/GuptaK13,
  author    = {Srishti Gupta and
               Ponnurangam Kumaraguru},
  title     = {OCEAN: Open-source Collation of eGovernment data And Networks
               - Understanding Privacy Leaks in Open Government Data},
  journal   = {CoRR},
  volume    = {abs/1312.2784},
  year      = {2013},
  ee        = {http://arxiv.org/abs/1312.2784},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}