Mahdi Nasrullah Al-Ameen
YOU?
Author Swipe
View article: Understanding Teen’s Expectations and Challenges to Seek Help in Social Media
Understanding Teen’s Expectations and Challenges to Seek Help in Social Media Open
View article: "Synchronized parenting is like mixing oil and water": Reimagining Parental Control for Co-parenting in the Divorced Households
"Synchronized parenting is like mixing oil and water": Reimagining Parental Control for Co-parenting in the Divorced Households Open
Children from divorced households are granted access to devices (e.g., smartphones, tablets), helping them to maintain meaningful contact with both parents. However, regulating their device usage across two households presents unique co-pa…
View article: One Size Doesn't Fit All: Towards Design and Evaluation of Developmentally Appropriate Parental Control Tool
One Size Doesn't Fit All: Towards Design and Evaluation of Developmentally Appropriate Parental Control Tool Open
View article: “It’s Definitely New and Different…It’s Really Engaging”: Understanding the Power of Storytelling Towards Secure Password Creation
“It’s Definitely New and Different…It’s Really Engaging”: Understanding the Power of Storytelling Towards Secure Password Creation Open
There is a dearth in existing literature to attain systematic understanding of leveraging digital storytelling in security designs. As we begin to address this gap, we focused on user authentication where the existing password composition …
View article: A First Look into Fake Profiles on Social Media through the Lens of Victim's Experiences
A First Look into Fake Profiles on Social Media through the Lens of Victim's Experiences Open
View article: Hacker, Their Actions, and Fear Appeal: A First Look Through the Lens of Children
Hacker, Their Actions, and Fear Appeal: A First Look Through the Lens of Children Open
View article: Leveraging the Power of Storytelling to Encourage and Empower Children towards Strong Passwords
Leveraging the Power of Storytelling to Encourage and Empower Children towards Strong Passwords Open
With the increasing use of computer and smartphones by children, their online safety has been of major concern due to their limited security knowledge and skills. User authentication is pivotal for their security protection, where a body o…
View article: A First Look into Targeted Clickbait and its Countermeasures: The Power of Storytelling
A First Look into Targeted Clickbait and its Countermeasures: The Power of Storytelling Open
Clickbait headlines work through superlatives and intensifiers, creating information gaps to increase the relevance of their associated links that direct users to time-wasting and sometimes even malicious websites. This approach can be amp…
View article: “I feel like he’s looking in the computer world to be social, but I can’t trust his judgement”: Reimagining Parental Control for Children with ASD
“I feel like he’s looking in the computer world to be social, but I can’t trust his judgement”: Reimagining Parental Control for Children with ASD Open
Children with Autism Spectrum Disorder (ASD) often seek comfort from devices (e.g., smartphones) to deal with social overstimulation. However, such reliance exposes them to inappropriate digital content and increases susceptibility to mimi…
View article: “It's like educating us older people...”: Unveiling Needs and Expectations Regarding Educational Features within Parental Control Tools
“It's like educating us older people...”: Unveiling Needs and Expectations Regarding Educational Features within Parental Control Tools Open
As children are getting access to devices at an increasingly younger age, parents need to grapple with new ways to protect them from online risks. This indicates the need for support from parental control tools to enhance their self-effica…
View article: "It's hard for him to make choices sometimes and he needs guidance": Re-orienting Parental Control for Children
"It's hard for him to make choices sometimes and he needs guidance": Re-orienting Parental Control for Children Open
With access to devices and online platforms at an increasingly younger age, it is essential to protect children from potential online risks. In our studies, we particularly focused the parents who have a child under 13 years of age. To thi…
View article: Priming through Persuasion: Towards Secure Password Behavior
Priming through Persuasion: Towards Secure Password Behavior Open
Users tend to create weak passwords even for the important accounts. The prior research shed light on user's insecure password behavior, and why the interventions, including requirement specification (e.g., password composition policies) a…
View article: "\"It doesn't just feel like something a lawyer slapped together.\"- Mental-Model-Based Privacy Policy for Third-Party Applications on Facebook"
"\"It doesn't just feel like something a lawyer slapped together.\"- Mental-Model-Based Privacy Policy for Third-Party Applications on Facebook" Open
Users are often unaware of the information that applications collect and are surprised by unexpected data collection and sharing practices. With numerous third-party applications on Facebook potentially accessing the personal information o…
View article: “After she fell asleep, it went to my next podcast, which was about a serial killer”: Unveiling Needs and Expectations Regarding Parental Control within Digital Assistant
“After she fell asleep, it went to my next podcast, which was about a serial killer”: Unveiling Needs and Expectations Regarding Parental Control within Digital Assistant Open
Voice-based digital assistants (for brevity, we term them as 'digital assistants' in this paper, unless otherwise specified) are getting increasingly popular in the household to automate digital routines. Hence, with communal usage of digi…
View article: Understanding the Challenges in Academia to Prepare Nursing Students for Digital Technology Use at Workplace
Understanding the Challenges in Academia to Prepare Nursing Students for Digital Technology Use at Workplace Open
Digital technology has transformed workplaces in recent years. The technology adoption in medical institutions has challenged nurses to evolve in using complex digital systems. However, academic institutions often fail to keep up with the …
View article: Can Password Meter be More Effective Towards User Attention, Engagement, and Attachment?: A Study of Metaphor-based Designs
Can Password Meter be More Effective Towards User Attention, Engagement, and Attachment?: A Study of Metaphor-based Designs Open
Password meter offers feedback on users' password strength, with a goal of protecting against security breaches. In this study, we aimed at understanding the potential of leveraging metaphor in password meter design to grab user attention,…
View article: A First Look into Software Security Practices in Bangladesh
A First Look into Software Security Practices in Bangladesh Open
Software security practices are critical in minimizing vulnerabilities and protecting unauthorized access to the code and the system. However, software security practices outside Western countries need to be better understood. This need fo…
View article: A Deep Dive into User's Preferences and Behavior around Mobile Phone Sharing
A Deep Dive into User's Preferences and Behavior around Mobile Phone Sharing Open
Users share their personal devices with different entities in various circumstances. While prior research shed light on the broad reasons behind the sharing of mobile phones, there is a dearth of systematic study to understand the user's d…
View article: Imagined Online Communities: Communionship, Sovereignty, and Inclusiveness in Facebook Groups
Imagined Online Communities: Communionship, Sovereignty, and Inclusiveness in Facebook Groups Open
Through Facebook "Group" feature, users often sensitize communionships, join different Facebook groups, and establish imagined communities with known people and strangers. In our interview study with 32 admins and users of Facebook groups,…
View article: “We, three brothers have always known everything of each other”: A Cross-cultural Study of Sharing Digital Devices and Online Accounts
“We, three brothers have always known everything of each other”: A Cross-cultural Study of Sharing Digital Devices and Online Accounts Open
Although many technologies assume that a device or an account would be used by a single user, prior research has found that this assumption may not hold true in everyday life. Most studies conducted to date focused on sharing a device or a…
View article: SaTC: CORE: Medium: Collaborative: BaitBuster 2.0: Keeping Users Away From Clickbait
SaTC: CORE: Medium: Collaborative: BaitBuster 2.0: Keeping Users Away From Clickbait Open
View article: “Most Companies Share Whatever They Can to Make Money!”: Comparing User’s Perceptions with the Data Practices of IoT Devices
“Most Companies Share Whatever They Can to Make Money!”: Comparing User’s Perceptions with the Data Practices of IoT Devices Open
View article: The Impact of Cues and User Interaction on the Memorability of System-assigned Random Passwords
The Impact of Cues and User Interaction on the Memorability of System-assigned Random Passwords Open
Given the choice, users produce passwords reflecting common strategies and patterns that ease recall but offer uncertain and often weak security. Addressing this usability-security tension in user authentication remains the key research is…
View article: Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues
Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues Open
Given the choice, users produce passwords reflecting common strategies and patterns that ease recall but offer uncertain and often weak security. System-assigned passwords provide measurable security but suffer from poor memorability. To a…
View article: Leveraging Real-Life Facts to Make Random Passwords More Memorable
Leveraging Real-Life Facts to Make Random Passwords More Memorable Open