Hi there! I'm
Ehsan Ul Haque
I'm a Software Engineer at Meta with a passion for learning, building, and problem-solving. My journey began in computer science, where I discovered the transformative power of programming and developed confidence through hands-on projects like a GUI-based Tic-Tac-Toe game and a 3D model of the Taj Mahal.
In my career, I explored both academia and industry. My research in usable security and privacy combines my technical skills with a human-centered approach, exploring how people interact with security and privacy tools.
I'm excited by new challenges and driven to keep pushing the boundaries of what I can achieve. Feel free to reach out if you want to collaborate, have a question, or just want to connect — ashik.buet10@gmail.com
Featured Projects
A selection of projects I've built. For a complete list, see projects page.
Fullstack Job Application Tracker
A fullstack web application to track job applications. Backend includes a robust REST API service built with Go to manage job applications, resumes, and related resources...
Amazon Mechanical Turk Requester API Helpers
This .NET application serves as a powerful toolkit for advanced requester tasks on [Amazon Mechanical Turk (MTurk)](https://www.mturk.com/). Equipped with a curated set of helper functions, it allows users to programmatically handle *requester* tasks that go beyond the capabilities of the standard MTurk Web Requester Portal...
15 Puzzle Game
This project brings the classic [15 Puzzle game](https://en.wikipedia.org/wiki/15_puzzle) to life with a Java Swing interface, offering an intuitive and interactive experience. From the main menu, clicking the *Game* button launches the puzzle, where players can shuffle the grid and take on the challenge of reordering the tiles to their original positions...
Featured Research
Recent research contributions in usable security and privacy. For a complete list, see research page.
Do Technical Level and Trust in Service Providers Inform Consumers' Privacy Control Adoption?
As tech companies increasingly collect user data, understanding how users perceive and respond to privacy controls is crucial. This study examines the trust gap between technical and non-technical users in service providers' data collection...
How do Users' Calculate Tradeoff between Privacy and Money at IoT Purchase Time?
As the 'pay for privacy' model gains momentum, we investigated how users weigh data privacy against monetary benefits. Our study, using an incentive-compatible lottery on Prolific, uncovers the subtle calculations that drive user choices in privacy-focused IoT purchases..
Who's to Blame When a Data Breach Occurs?
This study explores how users' past security actions impact their blame attribution. Surprisingly, we found that non-compliant users tend to deflect blame onto service providers...