Upcoming Courses

go to course
UI Design Patterns for Successful Software
Starts the day after tomorrow !
go to course
Affordances: Designing Intuitive User Interfaces
92% booked. Starts in 3 days
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Upcoming Courses

go to course
UI Design Patterns for Successful Software
Starts the day after tomorrow !
go to course
Affordances: Designing Intuitive User Interfaces
92% booked. Starts in 3 days
 
 

Proceedings of the 2006 Symposium on Usable Privacy and Security


 
Time and place:

2006
Conf. description:
Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.
Help us!
Do you know when the next conference is? If yes, please add it to the calendar!
Series:
This is a preferred venue for people like Lorrie Faith Cranor, Robert W. Reeder, Jason Hong, Konstantin Beznosov, and Lorrie Cranor. Part of the SOUPS - Symposium on Usable Privacy and Security conference series.
Other years:
Publisher:
ACM Press
EDIT

References from this conference (2006)

The following articles are from "Proceedings of the 2006 Symposium on Usable Privacy and Security":

 what's this?

Articles

p. 1-7

DeWitt, Alexander J. and Kuljis, Jasna (2006): Aligning usability and security: a usability study of Polaris. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 1-7. Available online

p. 102-113

Wu, Min, Miller, Robert C. and Little, Greg (2006): Web wallet: preventing phishing attacks by revealing user intentions. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 102-113. Available online

p. 114-121

Karger, Paul A. (2006): Privacy and security threat analysis of the federal employee personal identity verification (PIV) program. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 114-121. Available online

p. 122-132

Newman, Richard, Gavette, Sherman, Yonge, Larry and Anderson, Ross (2006): Protecting domestic power-line communications. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 122-132. Available online

p. 133-144

Gideon, Julia, Cranor, Lorrie, Egelman, Serge and Acquisti, Alessandro (2006): Power strips, prophylactics, and privacy, oh my!. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 133-144. Available online

p. 145-155

Rode, Jennifer Ann, Johansson, Carolina, DiGioia, Paul, Filho, Roberto Silva, Nies, Kari, Nguyen, David H., Ren, Jie, Dourish, Paul and Redmiles, David F. (2006): Seeing further: extending visualization as a basis for usable security. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 145-155. Available online

p. 20-31

Cao, Xiang and Iverson, Lee (2006): Intentional access management: making access control usable for end-users. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 20-31. Available online

p. 32-43

Yee, Ka-Ping and Sitaker, Kragen (2006): Passpet: convenient password management and phishing protection. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 32-43. Available online

p. 44-55

Gaw, Shirley and Felten, Edward (2006): Password management strategies for online accounts. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 44-55. Available online

p. 56-66

Tari, Furkan, Ozok, A. Ant and Holden, Stephen H. (2006): A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 56-66. Available online

p. 67-78

Kuo, Cynthia, Romanosky, Sasha and Cranor, Lorrie Faith (2006): Human selection of mnemonic phrase-based passwords. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 67-78. Available online

p. 79-90

Downs, Julie S., Holbrook, Mandy B. and Cranor, Lorrie Faith (2006): Decision strategies and susceptibility to phishing. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 79-90. Available online

p. 8-19

Brodie, Carolyn A., Karat, Clare-Marie and Karat, John (2006): An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 8-19. Available online

p. 91-101

Fu, Anthony Y., Deng, Xiaotie, Wenyin, Liu and Little, Greg (2006): The methodology and an application to fight against Unicode attacks. In: Proceedings of the 2006 Symposium on Usable Privacy and Security 2006. pp. 91-101. Available online


 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 

User-contributed notes

Give us your opinion! Do you have any comments/additions
that you would like other visitors to see?

 
comment You (your email) say: Oct 31st, 2014
#1
Oct 31
Add a thoughtful commentary or note to this page ! 
 

will be spam-protected
How many?
= e.g. "6"
User ExperienceBy submitting you agree to the Site Terms
 
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/conferences/proceedings_of_the_2006_symposium_on_usable_privacy_and_security.html