<?xml version="1.0"?>
<dblpperson name="Yee-Yin Choong" pid="33/993" n="25">
<person key="homepages/33/993" mdate="2009-06-09">
<author pid="33/993">Yee-Yin Choong</author>
</person>
<r><inproceedings key="conf/hci/JensenHC25" mdate="2025-07-06">
<author orcid="0000-0003-4969-4456" pid="203/1741">Theodore Jensen</author>
<author orcid="0000-0002-8555-1850" pid="407/1015">Gregory Haber</author>
<author orcid="0000-0002-3889-6047" pid="33/993">Yee-Yin Choong</author>
<title>Means to an End: Assessing the Validity of Trust Scales in Artificial Intelligence Vignettes.</title>
<pages>86-105</pages>
<year>2025</year>
<booktitle>HCI (54)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-93412-4_5</ee>
<crossref>conf/hci/2025-54</crossref>
<url>db/conf/hci/hci2025-54.html#JensenHC25</url>
<stream>streams/conf/hci</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/hci/ChoongBW23" mdate="2023-07-21">
<author orcid="0000-0002-3889-6047" pid="33/993">Yee-Yin Choong</author>
<author orcid="0000-0002-2735-8809" pid="351/4655">Kerrianne Buchanan</author>
<author orcid="0000-0002-9176-6778" pid="351/5294">Olivia Williams</author>
<title>Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Children's Password Practices.</title>
<pages>29-48</pages>
<year>2023</year>
<booktitle>HCI (35)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-35822-7_3</ee>
<crossref>conf/hci/2023-35</crossref>
<url>db/conf/hci/hci2023-35.html#ChoongBW23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hci/WilliamsBC23" mdate="2023-07-21">
<author orcid="0000-0002-9176-6778" pid="351/5294">Olivia Williams</author>
<author orcid="0000-0002-2735-8809" pid="351/4655">Kerrianne Buchanan</author>
<author orcid="0000-0002-3889-6047" pid="33/993">Yee-Yin Choong</author>
<title>'They're Not Risky' vs 'It Can Ruin Your Whole Life': How Parent-Child Dyads Differ in their Understandings of Online Risk.</title>
<pages>529-547</pages>
<year>2023</year>
<booktitle>HCI (16)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-35927-9_36</ee>
<crossref>conf/hci/2023-16</crossref>
<url>db/conf/hci/hci2023-16.html#WilliamsBC23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/soups/WilliamsCB23" mdate="2024-09-05">
<author pid="351/5294">Olivia Williams</author>
<author pid="33/993">Yee-Yin Choong</author>
<author pid="351/4655">Kerrianne Buchanan</author>
<title>Youth understandings of online privacy and security: A dyadic study of children and their parents.</title>
<pages>399-416</pages>
<year>2023</year>
<booktitle>SOUPS</booktitle>
<ee type="oa">https://www.usenix.org/conference/soups2023/presentation/williams</ee>
<crossref>conf/soups/2023</crossref>
<url>db/conf/soups/soups2023.html#WilliamsCB23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hci/DawkinsMCG21" mdate="2021-07-29">
<author orcid="0000-0002-8114-0608" pid="04/1377">Shane&#233; Dawkins</author>
<author orcid="0000-0002-2735-8809" pid="351/4655">Kerrianne Morrison</author>
<author orcid="0000-0002-3889-6047" pid="33/993">Yee-Yin Choong</author>
<author orcid="0000-0001-7034-3672" pid="86/4184">Kristen K. Greene</author>
<title>What Futuristic Technology Means for First Responders: Voices from the Field.</title>
<pages>271-291</pages>
<year>2021</year>
<booktitle>HCI (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-78468-3_19</ee>
<crossref>conf/hci/2021-3</crossref>
<url>db/conf/hci/hci2021-3.html#DawkinsMCG21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hci/MorrisonDCTGF21" mdate="2021-07-29">
<author orcid="0000-0002-2735-8809" pid="351/4655">Kerrianne Morrison</author>
<author orcid="0000-0002-8114-0608" pid="04/1377">Shane&#233; Dawkins</author>
<author orcid="0000-0002-3889-6047" pid="33/993">Yee-Yin Choong</author>
<author pid="72/2304">Mary Frances Theofanos</author>
<author orcid="0000-0001-7034-3672" pid="86/4184">Kristen K. Greene</author>
<author pid="26/11234">Susanne Furman</author>
<title>Current Problems, Future Needs: Voices of First Responders About Communication Technology.</title>
<pages>381-399</pages>
<year>2021</year>
<booktitle>HCI (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-78468-3_26</ee>
<crossref>conf/hci/2021-3</crossref>
<url>db/conf/hci/hci2021-3.html#MorrisonDCTGF21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iscram/MorrisonCDP21" mdate="2022-11-10">
<author pid="351/4655">Kerrianne Morrison</author>
<author pid="33/993">Yee-Yin Choong</author>
<author pid="04/1377">Shane&#233; Dawkins</author>
<author pid="165/7090">Sandra Spickard Prettyman</author>
<title>Communication Technology Problems and Needs of Rural First Responders.</title>
<pages>817-834</pages>
<year>2021</year>
<booktitle>ISCRAM</booktitle>
<ee type="oa">https://idl.iscram.org/show.php?record=2376</ee>
<crossref>conf/iscram/2021</crossref>
<url>db/conf/iscram/iscram2021.html#MorrisonCDP21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/TheofanosCM21" mdate="2021-09-16">
<author pid="72/2304">Mary Theofanos</author>
<author pid="33/993">Yee-Yin Choong</author>
<author pid="301/5915">Olivia Murphy</author>
<title>'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.</title>
<pages>19-35</pages>
<year>2021</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity21/presentation/theofanos</ee>
<crossref>conf/uss/2021</crossref>
<url>db/conf/uss/uss2021.html#TheofanosCM21</url>
</inproceedings>
</r>
<r><article key="journals/cybersecurity/ChoongTRP19" mdate="2023-08-28">
<author orcid="0000-0002-3889-6047" pid="33/993">Yee-Yin Choong</author>
<author pid="72/2304">Mary Frances Theofanos</author>
<author orcid="0000-0002-7187-6531" pid="r/KarenRenaud">Karen Renaud</author>
<author pid="97/858">Suzanne Prior</author>
<title>&#34;Passwords protect my stuff&#34; - a study of children's password practices.</title>
<pages>tyz015</pages>
<year>2019</year>
<volume>5</volume>
<journal>J. Cybersecur.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1093/cybsec/tyz015</ee>
<ee>https://www.wikidata.org/entity/Q100519104</ee>
<url>db/journals/cybersecurity/cybersecurity5.html#ChoongTRP19</url>
</article>
</r>
<r><article key="journals/imcs/GreeneC17" mdate="2023-08-28">
<author pid="86/4184">Kristen K. Greene</author>
<author pid="33/993">Yee-Yin Choong</author>
<title>Must I, can I? I don't understand your ambiguous password rules.</title>
<pages>80-99</pages>
<year>2017</year>
<volume>25</volume>
<journal>Inf. Comput. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1108/ICS-06-2016-0043</ee>
<ee>https://www.wikidata.org/entity/Q114629825</ee>
<url>db/journals/imcs/imcs25.html#GreeneC17</url>
</article>
</r>
<r><article key="journals/ieeesp/TheofanosGC16" mdate="2024-08-04">
<author pid="72/2304">Mary Theofanos</author>
<author orcid="0000-0003-1294-2831" pid="70/2101">Simson L. Garfinkel</author>
<author pid="33/993">Yee-Yin Choong</author>
<title>Secure and Usable Enterprise Authentication: Lessons from the Field.</title>
<pages>14-21</pages>
<year>2016</year>
<volume>14</volume>
<journal>IEEE Secur. Priv.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/MSP.2016.96</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2016.96</ee>
<url>db/journals/ieeesp/ieeesp14.html#TheofanosGC16</url>
</article>
</r>
<r><inproceedings key="conf/hci/LeeC15" mdate="2017-05-24">
<author pid="120/4255">Paul Y. Lee</author>
<author pid="33/993">Yee-Yin Choong</author>
<title>Human Generated Passwords - The Impacts of Password Requirements and Presentation Styles.</title>
<pages>83-94</pages>
<year>2015</year>
<booktitle>HCI (22)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-20376-8_8</ee>
<crossref>conf/hci/2015-22</crossref>
<url>db/conf/hci/hci2015-22.html#LeeC15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hci/ChoongT15" mdate="2017-05-24">
<author pid="33/993">Yee-Yin Choong</author>
<author pid="72/2304">Mary Theofanos</author>
<title>What 4, 500+ People Can Tell You - Employees' Attitudes Toward Organizational Password Policy Do Matter.</title>
<pages>299-310</pages>
<year>2015</year>
<booktitle>HCI (22)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-20376-8_27</ee>
<crossref>conf/hci/2015-22</crossref>
<url>db/conf/hci/hci2015-22.html#ChoongT15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hci/Choong14" mdate="2017-05-24">
<author pid="33/993">Yee-Yin Choong</author>
<title>A Cognitive-Behavioral Framework of User Password Management Lifecycle.</title>
<pages>127-137</pages>
<year>2014</year>
<booktitle>HCI (24)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-07620-1_12</ee>
<crossref>conf/hci/2014-24</crossref>
<url>db/conf/hci/hci2014-24.html#Choong14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icb/ChoongT14" mdate="2017-05-24">
<author pid="33/993">Yee-Yin Choong</author>
<author pid="72/2304">Mary Theofanos</author>
<title>Ten-print fingerprint self-captures: Graphics-only user guidance without language.</title>
<pages>1-8</pages>
<year>2014</year>
<booktitle>IJCB</booktitle>
<ee>https://doi.org/10.1109/BTAS.2014.6996277</ee>
<crossref>conf/icb/2014</crossref>
<url>db/conf/icb/ijcb2014.html#ChoongT14</url>
</inproceedings>
</r>
<r><article key="journals/ieeesp/FurmanTCS12" mdate="2021-12-24">
<author pid="26/11234">Susanne Furman</author>
<author pid="72/2304">Mary Frances Theofanos</author>
<author pid="33/993">Yee-Yin Choong</author>
<author pid="146/5933">Brian C. Stanton</author>
<title>Basing Cybersecurity Training on User Perceptions.</title>
<pages>40-49</pages>
<year>2012</year>
<volume>10</volume>
<journal>IEEE Secur. Priv.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/MSP.2011.180</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2011.180</ee>
<url>db/journals/ieeesp/ieeesp10.html#FurmanTCS12</url>
</article>
</r>
<r><inproceedings key="conf/btas/ChoongTG12" mdate="2017-05-19">
<author pid="33/993">Yee-Yin Choong</author>
<author pid="72/2304">Mary Frances Theofanos</author>
<author pid="01/4215">Haiying Guan</author>
<title>Fingerprint self-captures: Usability of a fingerprint system with real-time feedback.</title>
<pages>16-22</pages>
<year>2012</year>
<booktitle>BTAS</booktitle>
<ee>https://doi.org/10.1109/BTAS.2012.6374553</ee>
<crossref>conf/btas/2012</crossref>
<url>db/conf/btas/btas2012.html#ChoongTG12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icb/GuanTCS11" mdate="2023-03-24">
<author pid="01/4215">Haiying Guan</author>
<author pid="72/2304">Mary Frances Theofanos</author>
<author pid="33/993">Yee-Yin Choong</author>
<author pid="146/5933">Brian C. Stanton</author>
<title>Real-time feedback for usable fingerprint systems.</title>
<pages>1-8</pages>
<year>2011</year>
<booktitle>IJCB</booktitle>
<ee>https://doi.org/10.1109/IJCB.2011.6117495</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IJCB.2011.6117495</ee>
<crossref>conf/icb/2011</crossref>
<url>db/conf/icb/ijcb2011.html#GuanTCS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/interact/PaulMZCT11" mdate="2018-06-26">
<author pid="85/7090">Celeste Lyn Paul</author>
<author pid="75/3985">Emile L. Morse</author>
<author pid="08/9687">Aiping Zhang</author>
<author pid="33/993">Yee-Yin Choong</author>
<author pid="72/2304">Mary Frances Theofanos</author>
<title>A Field Study of User Behavior and Perceptions in Smartcard Authentication.</title>
<pages>1-17</pages>
<year>2011</year>
<booktitle>INTERACT (4)</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-23768-3_1</ee>
<crossref>conf/interact/2011-4</crossref>
<url>db/conf/interact/interact2011-4.html#PaulMZCT11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/chi/OConnellC08" mdate="2018-11-06">
<author pid="03/2103">Theresa A. O'Connell</author>
<author pid="33/993">Yee-Yin Choong</author>
<title>Metrics for measuring human interaction with interactive visualizations for information analysis.</title>
<pages>1493-1496</pages>
<year>2008</year>
<booktitle>CHI</booktitle>
<ee>https://doi.org/10.1145/1357054.1357287</ee>
<crossref>conf/chi/2008</crossref>
<url>db/conf/chi/chi2008.html#OConnellC08</url>
</inproceedings>
</r>
<r><article key="journals/ijhci/ChoongS99" mdate="2020-06-18">
<author pid="33/993">Yee-Yin Choong</author>
<author pid="s/GavrielSalvendy">Gavriel Salvendy</author>
<title>Implications for Design of Computer Interfaces for Chinese Users in Mainland China.</title>
<pages>29-46</pages>
<year>1999</year>
<volume>11</volume>
<journal>Int. J. Hum. Comput. Interact.</journal>
<number>1</number>
<ee>https://doi.org/10.1207/s15327590ijhc1101_2</ee>
<url>db/journals/ijhci/ijhci11.html#ChoongS99</url>
</article>
</r>
<r><inproceedings key="conf/hci/WhiteC99" mdate="2002-05-16">
<author pid="31/6546">David White</author>
<author pid="33/993">Yee-Yin Choong</author>
<title>What are you looking at on the web: information or applications?</title>
<pages>76-79</pages>
<year>1999</year>
<crossref>conf/hci/1999-2</crossref>
<booktitle>HCI (2)</booktitle>
<url>db/conf/hci/hci1999-2.html#WhiteC99</url>
</inproceedings>
</r>
<r><article key="journals/iwc/ChoongS98" mdate="2025-01-19">
<author pid="33/993">Yee-Yin Choong</author>
<author pid="s/GavrielSalvendy">Gavriel Salvendy</author>
<title>Design of Icons for Use by Chinese in Mainland China.</title>
<pages>417-430</pages>
<year>1998</year>
<volume>9</volume>
<journal>Interact. Comput.</journal>
<number>4</number>
<url>db/journals/iwc/iwc9.html#ChoongS98</url>
<ee>https://doi.org/10.1016/S0953-5438(97)00026-X</ee>
<ee>https://www.wikidata.org/entity/Q127310361</ee>
</article>
</r>
<r><article key="journals/behaviourIT/LinCS97" mdate="2020-03-12">
<author pid="158/3256">Han X. Lin</author>
<author pid="33/993">Yee-Yin Choong</author>
<author pid="s/GavrielSalvendy">Gavriel Salvendy</author>
<title>A proposed index of usability: A method for comparing the relative usability of different software systems.</title>
<pages>267-277</pages>
<year>1997</year>
<volume>16</volume>
<journal>Behav. Inf. Technol.</journal>
<number>4-5</number>
<ee>https://doi.org/10.1080/014492997119833</ee>
<ee>https://www.wikidata.org/entity/Q56892410</ee>
<url>db/journals/behaviourIT/behaviourIT16.html#LinCS97</url>
</article>
</r>
<r><inproceedings key="conf/hci/ChoongS97" mdate="2002-05-31">
<author pid="33/993">Yee-Yin Choong</author>
<author pid="s/GavrielSalvendy">Gavriel Salvendy</author>
<title>Design of Computer Interfaces for the Chinese Population.</title>
<pages>173-176</pages>
<year>1997</year>
<crossref>conf/hci/1997-1</crossref>
<booktitle>HCI (1)</booktitle>
<url>db/conf/hci/hci1997-1.html#ChoongS97</url>
</inproceedings>
</r>
<coauthors n="23" nc="2">
<co c="0" n="2"><na f="b/Buchanan:Kerrianne" pid="351/4655">Kerrianne Buchanan</na><na>Kerrianne Morrison</na></co>
<co c="0"><na f="d/Dawkins:Shane=eacute=" pid="04/1377">Shane&#233; Dawkins</na></co>
<co c="0"><na f="f/Furman:Susanne" pid="26/11234">Susanne Furman</na></co>
<co c="0"><na f="g/Garfinkel:Simson_L=" pid="70/2101">Simson L. Garfinkel</na></co>
<co c="0"><na f="g/Greene:Kristen_K=" pid="86/4184">Kristen K. Greene</na></co>
<co c="0"><na f="g/Guan:Haiying" pid="01/4215">Haiying Guan</na></co>
<co c="0"><na f="h/Haber:Gregory" pid="407/1015">Gregory Haber</na></co>
<co c="0"><na f="j/Jensen:Theodore" pid="203/1741">Theodore Jensen</na></co>
<co c="0"><na f="l/Lee:Paul_Y=" pid="120/4255">Paul Y. Lee</na></co>
<co c="1"><na f="l/Lin:Han_X=" pid="158/3256">Han X. Lin</na></co>
<co c="0"><na f="m/Morse:Emile_L=" pid="75/3985">Emile L. Morse</na></co>
<co c="0"><na f="m/Murphy:Olivia" pid="301/5915">Olivia Murphy</na></co>
<co c="-1"><na f="o/O=Connell:Theresa_A=" pid="03/2103">Theresa A. O'Connell</na></co>
<co c="0"><na f="p/Paul:Celeste_Lyn" pid="85/7090">Celeste Lyn Paul</na></co>
<co c="0"><na f="p/Prettyman:Sandra_Spickard" pid="165/7090">Sandra Spickard Prettyman</na></co>
<co c="0"><na f="p/Prior:Suzanne" pid="97/858">Suzanne Prior</na></co>
<co c="0"><na f="r/Renaud:Karen" pid="r/KarenRenaud">Karen Renaud</na></co>
<co c="1"><na f="s/Salvendy:Gavriel" pid="s/GavrielSalvendy">Gavriel Salvendy</na></co>
<co c="0"><na f="s/Stanton:Brian_C=" pid="146/5933">Brian C. Stanton</na></co>
<co c="0" n="2"><na f="t/Theofanos:Mary_Frances" pid="72/2304">Mary Frances Theofanos</na><na>Mary Theofanos</na></co>
<co c="-1"><na f="w/White:David" pid="31/6546">David White</na></co>
<co c="0"><na f="w/Williams:Olivia" pid="351/5294">Olivia Williams</na></co>
<co c="0"><na f="z/Zhang:Aiping" pid="08/9687">Aiping Zhang</na></co>
</coauthors>
</dblpperson>

