Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where William Melicher is active.

Publication


Featured researches published by William Melicher.


human factors in computing systems | 2016

Usability and Security of Text Passwords on Mobile Devices

William Melicher; Darya Kurilova; Sean M. Segreti; Pranshu Kalvani; Richard Shay; Blase Ur; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor; Michelle L. Mazurek

Recent research has improved our understanding of how to create strong, memorable text passwords. However, this research has generally been in the context of desktops and laptops, while users are increasingly creating and entering passwords on mobile devices. In this paper we study whether recent password guidance carries over to the mobile setting. We compare the strength and usability of passwords created and used on mobile devices with those created and used on desktops and laptops, while varying password policy requirements and input methods. We find that creating passwords on mobile devices takes significantly longer and is more error prone and frustrating. Passwords created on mobile devices are also weaker, but only against attackers who can make more than 10^13 guesses. We find that the effects of password policies differ between the desktop and mobile environments, and suggest ways to ease password entry for mobile users.


human factors in computing systems | 2015

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior

Richard Shay; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor; Alain Forget; Saranga Komanduri; Michelle L. Mazurek; William Melicher; Sean M. Segreti; Blase Ur

Users often struggle to create passwords under strict requirements. To make this process easier, some providers present real-time feedback during password creation, indicating which requirements are not yet met. Other providers guide users through a multi-step password-creation process. Our 6,435-participant online study examines how feedback and guidance affect password security and usability. We find that real-time password-creation feedback can help users create strong passwords with fewer errors. We also find that although guiding participants through a three-step password-creation process can make creation easier, it may result in weaker passwords. Our results suggest that service providers should present password requirements with feedback to increase usability. However, the presentation of feedback and guidance must be carefully considered, since identical requirements can have different security and usability effects depending on presentation.


human factors in computing systems | 2017

Design and Evaluation of a Data-Driven Password Meter

Blase Ur; Felicia Alfieri; Maung Aung; Lujo Bauer; Nicolas Christin; Jessica Colnago; Lorrie Faith Cranor; Henry Dixon; Pardis Emami Naeini; Hana Habib; Noah Johnson; William Melicher

Despite their ubiquity, many password meters provide inaccurate strength estimates. Furthermore, they do not explain to users what is wrong with their password or how to improve it. We describe the development and evaluation of a data-driven password meter that provides accurate strength measurement and actionable, detailed feedback to users. This meter combines neural networks and numerous carefully combined heuristics to score passwords and generate data-driven text feedback about the users password. We describe the meters iterative development and final design. We detail the security and usability impact of the meters design dimensions, examined through a 4,509-participant online study. Under the more common password-composition policy we tested, we found that the data-driven meter with detailed feedback led users to create more secure, and no less memorable, passwords than a meter with only a bar as a strength indicator.


human factors in computing systems | 2016

Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors

Manya Sleeper; William Melicher; Hana Habib; Lujo Bauer; Lorrie Faith Cranor; Michelle L. Mazurek

People share personal content online with varied audiences, as part of tasks ranging from conversational-style content sharing to collaborative activities. We use an interview- and diary-based study to explore: 1) what factors impact channel choice for sharing with particular audiences; and 2) what behavioral patterns emerge from the ability to combine or switch between channels. We find that in the context of different tasks, participants match channel features to selective-sharing and other task-based needs, shaped by recipient attributes and communication dynamics. Participants also combine multiple channels to create composite sharing features or reach broader audiences when one channel is insufficient. We discuss design implications of these channel dynamics.


privacy enhancing technologies | 2016

(Do Not) Track Me Sometimes: Users’ Contextual Preferences for Web Tracking

William Melicher; Mahmood Sharif; Joshua Tan; Lujo Bauer; Mihai Christodorescu; Pedro Giovanni Leon

Abstract Online trackers compile profiles on users for targeting ads, customizing websites, and selling users’ information. In this paper, we report on the first detailed study of the perceived benefits and risks of tracking-and the reasons behind them-conducted in the context of users’ own browsing histories. Prior work has studied this in the abstract; in contrast, we collected browsing histories from and interviewed 35 people about the perceived benefits and risks of online tracking in the context of their own browsing behavior. We find that many users want more control over tracking and think that controlled tracking has benefits, but are unwilling to put in the effort to control tracking or distrust current tools. We confirm previous findings that users’ general attitudes about tracking are often at odds with their comfort in specific situations. We also identify specific situational factors that contribute to users’ preferences about online tracking and explore how and why. Finally, we examine a sample of popular tools for controlling tracking and show that they only partially address the situational factors driving users’ preferences.We suggest opportunities to improve such tools, and explore the use of a classifier to automatically determine whether a user would be comfortable with tracking on a particular page visit; our results suggest this is a promising direction for future work.


international conference on distributed computing systems workshops | 2017

Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences

Primal Pappachan; Martin Degeling; Roberto Yus; Anupam Das; Sruti Bhagavatula; William Melicher; Pardis Emami Naeini; Shikun Zhang; Lujo Bauer; Alfred Kobsa; Sharad Mehrotra; Norman M. Sadeh; Nalini Venkatasubramanian

The Internet of Things (IoT) is changing the way we interact with our environment in domains as diverse as health, transportation, office buildings and our homes. In smart building environments, information captured about the building and its inhabitants will aid in development of services that improve productivity, comfort, social interactions, safety, energy savings and more. However, by collecting and sharing information about buildings inhabitants and their activities, these services also open the door to privacy risks. In this paper, we introduce a framework where IoT Assistants capture and manage the privacy preferences of their users and communicate them to privacy-aware smart buildings, which enforce them when collecting user data or sharing it with building services. We outline elements necessary to support such interactions and also discuss important privacy policy attributes that need to be captured. This includes looking at attributes necessary to describe -- (1) the data collection and sharing practices associated with deployed sensors and services in smart buildings as well as (2) the privacy preferences to help users manage their privacy in such environments.


usenix security symposium | 2015

Measuring real-world accuracies and biases in modeling password guessability

Blase Ur; Sean M. Segreti; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor; Saranga Komanduri; Darya Kurilova; Michelle L. Mazurek; William Melicher; Richard Shay


usenix security symposium | 2016

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks

William Melicher; Blase Ur; Sean M. Segreti; Saranga Komanduri; Lujo Bauer; Nicolas Christin; Lorrie Faith Cranor


file and storage technologies | 2014

Toward strong, usable access control for shared distributed data

Michelle L. Mazurek; Yuan Liang; William Melicher; Manya Sleeper; Lujo Bauer; Gregory R. Ganger; Nitin Gupta; Michael K. Reiter


digital identity management | 2013

A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality

Lujo Bauer; Cristian Bravo-Lillo; Elli Fragkaki; William Melicher

Collaboration


Dive into the William Melicher's collaboration.

Top Co-Authors

Avatar

Lujo Bauer

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Blase Ur

University of Chicago

View shared research outputs
Top Co-Authors

Avatar

Nicolas Christin

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Sean M. Segreti

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Saranga Komanduri

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Richard Shay

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Hana Habib

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Darya Kurilova

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Jessica Colnago

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge