Maritza is a security and privacy researcher at ICSI. Her research tends to focus on helping people better understand the privacy and security decisions they encounter in their daily lives.

Previously, she was a user experience researcher at Google, a technical privacy manager at Facebook, and a postdoc with Professor David Wagner at UC Berkeley. She completed her PhD in computer science at Columbia University where her research adviser was Professor Steve Bellovin. As an undergrad, she studied computer science at University of San Diego.


Conference Papers

Maritza Johnson, Serge Egelman, and Steven M. Bellovin. Facebook and Privacy: it's complicated. In SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security, 2012.

[abstract] [bibtex] [pdf]

Maritza Johnson, John Karat, Clare-Marie Karat, and Keith Grueneberg. Optimizing a policy authoring framework for security and privacy policies. In SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010.

[abstract] [bibtex] [pdf]

Maritza Johnson, John Karat, Clare-Marie Karat, and Keith Grueneberg. Usable policy template authoring for iterative policy refinement. In POLICY '10: Proceedings of the IEEE International Workshop on Policies for Distributed Systems and Networks, 2010.

[abstract] [bibtex] [pdf]

Elli Androulaki, Maritza Johnson, Binh Vo and Steven Bellovin. Cybersecurity through an Identity Management System. Engaging Data Forum Conference, 2009.

[abstract] [bibtex] [pdf]

Maritza L. Johnson, Chaitanya Atreya, Adam Aviv, Mariana Raykova, Steven M. Bellovin, and Gail Kaiser. RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies. In UPSEC '08: Proceedings of the 1st Conference on Usability, Pyschology, and Security, April 2008.

[abstract] [bibtex] [pdf]

Zachary O. Toups, Ross Graeber, Andruid Kerne, Louis Tassinary, Sarah Berry, Kyle Overby, and Maritza Johnson. A Design for Using Physiological Signals to Affect Team Game Play. In ACI '06: Proceedings of Augmented Cognition International, Oct 2006.

[abstract] [bibtex] [pdf]


Michelle Madejski, Maritza Johnson, and Steven M. Bellovin. A Study of Privacy Settings Errors in an Online Social Network. In SESOC '12: Proceedings of the 4th IEEE International Workshop on Security and Social Networking, 2012.

[abstract] [bibtex] [pdf]

Maritza L. Johnson, Steven M. Bellovin, Robert W. Reeder, and Stuart Schechter. Laissez-faire file sharing: Access control designed for individuals at the endpoints. In NSPW '09: Proceedings of the New Security Paradigms Workshop, September 2009.

[abstract] [bibtex] [pdf]

Position Papers

Serge Egelman and Maritza Johnson. How Good is Good Enough? The Sisyphean struggle for optimal privacy settings. CSCW 2012 Workshop: Reconciling Privacy with Social Media.

[abstract] [bibtex] [pdf]

Maritza Johnson, Steven M. Bellovin, Angelos D. Keromytis. Computer Security Research with Human Subjects: Risks, Benefits, and Informed Consent. 2nd Workshop on Ethics in Computer Security Research 2011.

[abstract] [bibtex] [pdf]

Maritza Johnson and Steven M. Bellovin. Policy Management for E-Health Records. HealthSec 2010, Usenix Security Workshop, 2010. Position paper.

[abstract] [bibtex] [pdf]

Maritza L. Johnson and Mary Ellen Zurko, Security User Studies and Standards: Creating Best Practices, Security User Studies: Methodologies and Best Practices, CHI 2007, April 2007. [pdf]

Technical Reports

Michelle Madejski, Maritza Johnson, and Steven M. Bellovin. The Failure of Online Social Network Privacy Settings. Tech Report CUCS-010-11, Columbia University, February 2011. [pdf]

Shreyas Srivatsan, Maritza Johnson, and Steven M. Bellovin. Simple-VPN: Simple IPsec Configuration. Tech Report CUCS-020-10, Columbia University, July 2010. [pdf]

Hang Zhao, Maritza Johnson, Chi-Kin Chau, Steven M. Bellovin. Source Prefix Filtering in ROFL. Tech Report CUCS-033-09, Columbia University, July 2009. [pdf]


Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings. [abstract]


COMS 1007: Intro to Object Oriented Programming with Java.