default search action
Yusuf Albayram
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Md Abdullah Al Fahim, Mohammad Maifi Hasan Khan, Theodore Jensen, Yusuf Albayram:
Human vs. Automation: Which One Will You Trust More If You Are About to Lose Money? Int. J. Hum. Comput. Interact. 39(12): 2420-2435 (2023) - [j7]Md Abdullah Al Fahim, Mohammad Maifi Hasan Khan, Theodore Jensen, Yusuf Albayram, Emil Coman, Ross Buck:
The Mediating Effect of Emotions on Trust in the Context of Automated System Usage. IEEE Trans. Affect. Comput. 14(2): 1572-1585 (2023) - 2022
- [c20]Yusuf Albayram, David Suess, Yassir Yaghzar Elidrissi:
Investigating the Effectiveness of Personalized Content in the Form of Videos When Promoting a TOR Browser. EuroUSEC 2022: 216-232 - [c19]Yusuf Albayram, Richard DeWald, John Althen:
Remote Workers' Perceptions on Employee Monitoring. HCI (41) 2022: 361-382 - 2021
- [c18]Theodore Jensen, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Yusuf Albayram:
Trust and Anthropomorphism in Tandem: The Interrelated Nature of Automated Agent Appearance and Reliability in Trustworthiness Perceptions. Conference on Designing Interactive Systems 2021: 1470-1480 - [c17]Md Abdullah Al Fahim, Mohammad Maifi Hasan Khan, Theodore Jensen, Yusuf Albayram, Emil Coman:
Do Integral Emotions Affect Trust? The Mediating Effect of Emotions on Trust in the Context of Human-Agent Interaction. Conference on Designing Interactive Systems 2021: 1492-1503 - [c16]Yusuf Albayram, John Liu, Stivi Cangonj:
Comparing the Effectiveness of Text-based and Video-based Delivery in Motivating Users to Adopt a Password Manager. EuroUSEC 2021: 89-104 - 2020
- [j6]Theodore Jensen, Mohammad Maifi Hasan Khan, Yusuf Albayram, Md Abdullah Al Fahim, Ross Buck, Emil Coman:
Anticipated Emotions in Initial Trust Evaluations of a Drone System Based on Performance and Process Information. Int. J. Hum. Comput. Interact. 36(4): 316-325 (2020) - [c15]Sarah Marie Peck, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Emil N. Coman, Theodore Jensen, Yusuf Albayram:
Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA. COMPSAC 2020: 778-789 - [c14]Yusuf Albayram, Theodore Jensen, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Ross Buck, Emil Coman:
Investigating the Effects of (Empty) Promises on Human-Automation Interaction and Trust Repair. HAI 2020: 6-14 - [c13]Theodore Jensen, Mohammad Maifi Hasan Khan, Yusuf Albayram:
The Role of Behavioral Anthropomorphism in Human-Automation Trust Calibration. HCI (37) 2020: 33-53 - [c12]Devansh Amin, Yusuf Albayram:
Sequence Based Two-Factor Authentication (2FA) Method. HCI (48) 2020: 116-122
2010 – 2019
- 2019
- [j5]Yusuf Albayram, Theodore Jensen, Mohammad Maifi Hasan Khan, Ross Buck, Emil Coman:
Investigating the Effect of System Reliability, Risk, and Role on Users' Emotions and Attitudes toward a Safety-Critical Drone System. Int. J. Hum. Comput. Interact. 35(9): 761-772 (2019) - [c11]Theodore Jensen, Yusuf Albayram, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Ross Buck, Emil Coman:
The Apple Does Fall Far from the Tree: User Separation of a System from its Developers in Human-Automation Trust Repair. Conference on Designing Interactive Systems 2019: 1071-1082 - [c10]Md Abdullah Al Fahim, Mohammad Maifi Hasan Khan, Theodore Jensen, Yusuf Albayram, Emil Coman, Ross Buck:
Effect of Feedback on Users' Immediate Emotions: Analysis of Facial Expressions during a Simulated Target Detection Task. ICMI 2019: 49-58 - 2018
- [c9]Theodore Jensen, Yusuf Albayram, Mohammad Maifi Hasan Khan, Ross Buck, Emil Coman, Md Abdullah Al Fahim:
Initial Trustworthiness Perceptions of a Drone System based on Performance and Process Information. HAI 2018: 229-237 - [c8]Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Ross Buck, Emil Coman:
The Effects of Risk and Role on Users' Anticipated Emotions in Safety-Critical Systems. HCI (6) 2018: 369-388 - 2017
- [j4]Michael Fagan, Yusuf Albayram, Mohammad Maifi Hasan Khan, Ross Buck:
An investigation into users' considerations towards using password managers. Hum. centric Comput. Inf. Sci. 7: 12 (2017) - [j3]Yusuf Albayram, Mohammad Maifi Hasan Khan, Michael Fagan:
A Study on Designing Video Tutorials for Promoting Security Features: A Case Study in the Context of Two-Factor Authentication (2FA). Int. J. Hum. Comput. Interact. 33(11): 927-942 (2017) - [c7]Nhan Nguyen, Mohammad Maifi Hasan Khan, Yusuf Albayram, Kewen Wang, Swapna S. Gokhale:
Arion: A Model-Driven Middleware for Minimizing Data Loss in Stream Data Storage. CLOUD 2017: 34-41 - [c6]Nhan Nguyen, Mohammad Maifi Hasan Khan, Yusuf Albayram, Kewen Wang:
Understanding the Influence of Configuration Settings: An Execution Model-Driven Framework for Apache Spark Platform. CLOUD 2017: 802-807 - [c5]Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Nhan Nguyen:
"...better to use a lock screen than to worry about saving a few seconds of time": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. SOUPS 2017: 49-63 - 2016
- [j2]Yusuf Albayram, Mohammad Maifi Hasan Khan:
Evaluating smartphone-based dynamic security questions for fallback authentication: a field study. Hum. centric Comput. Inf. Sci. 6: 16 (2016) - 2015
- [j1]Yusuf Albayram, Mohammad Maifi Hasan Khan, Athanasios Bamis, Sotirios Kentros, Nhan Nguyen, Ruhua Jiang:
Designing challenge questions for location-based authentication systems: a real-life study. Hum. centric Comput. Inf. Sci. 5: 17 (2015) - [c4]Yusuf Albayram, Mohammad Maifi Hasan Khan:
Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field Study. SOUPS 2015: 211-224 - 2014
- [c3]Yusuf Albayram, Mohammad Maifi Hasan Khan, Athanasios Bamis, Sotiris Kentros, Nhan Nguyen, Ruhua Jiang:
A Location-Based Authentication System Leveraging Smartphones. MDM (1) 2014: 83-88 - 2013
- [c2]Yusuf Albayram, Sotiris Kentros, Ruhua Jiang, Athanasios Bamis:
A method for improving mobile authentication using human spatio-temporal behavior. ISCC 2013: 305-311 - 2012
- [c1]Sotiris Kentros, Yusuf Albayram, Athanasios Bamis:
Towards macroscopic human behavior based authentication for mobile transactions. UbiComp 2012: 641-642
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint