Upcoming Courses

go to course
Emotional Design: How to make products people will love
90% booked. Starts in 5 days
go to course
UI Design Patterns for Successful Software
82% booked. Starts in 13 days
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Upcoming Courses

go to course
Emotional Design: How to make products people will love
90% booked. Starts in 5 days
go to course
UI Design Patterns for Successful Software
82% booked. Starts in 13 days
 
 

Proceedings of the 2008 Symposium on Usable Privacy and Security


 
Time and place:

2008
Conf. description:
Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.
Help us!
Do you know when the next conference is? If yes, please add it to the calendar!
Series:
This is a preferred venue for people like Lorrie Faith Cranor, Robert W. Reeder, Jason Hong, Konstantin Beznosov, and Lorrie Cranor. Part of the SOUPS - Symposium on Usable Privacy and Security conference series.
Other years:
Publisher:
ACM Press
EDIT

References from this conference (2008)

The following articles are from "Proceedings of the 2008 Symposium on Usable Privacy and Security":

 what's this?

Articles

p. 1-12

Forget, Alain, Chiasson, Sonia, Oorschot, P. C. van and Biddle, Robert (2008): Improving text passwords through persuasion. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 1-12. Available online

p. 107-118

Werlinger, Rodrigo, Hawkey, Kirstie, Muldner, Kasia, Jaferian, Pooya and Beznosov, Konstantin (2008): The challenges of using an intrusion detection system: is it worth the effort?. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 107-118. Available online

p. 117-126

Falk, Laura, Prakash, Atul and Borders, Kevin (2008): Analyzing websites for user-visible security design flaws. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 117-126. Available online

p. 13-23

Rabkin, Ariel (2008): Personal knowledge questions for fallback authentication: security questions in the era of Facebook. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 13-23. Available online

p. 24-35

Dunphy, Paul, Nicholson, James and Olivier, Patrick (2008): Securing passfaces for description. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 24-35. Available online

p. 35-45

Hayashi, Eiji, Dhamija, Rachna, Christin, Nicolas and Perrig, Adrian (2008): Use Your Illusion: secure authentication usable anywhere. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 35-45. Available online

p. 44-52

Yan, Jeff and Ahmad, Ahmad Salah El (2008): Usability of CAPTCHAs or usability issues in CAPTCHA design. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 44-52. Available online

p. 56-67

Saxena, Nitesh, Uddin, Md. Borhan and Voris, Jonathan (2008): Universal device pairing using an auxiliary device. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 56-67. Available online

p. 65-73

Vaniea, Kami, Karat, Clare-Marie, Gross, Joshua B., Karat, John and Brodie, Carolyn (2008): Evaluating assistance of natural language policy authoring. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 65-73. Available online

p. 77-88

Inglesant, Philip, Sasse, M. Angela, Chadwick, David and Shi, Lei Lei (2008): Expressions of expertness: the virtuous circle of natural language for access control policy specification. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 77-88. Available online

p. 85-92

Brustoloni, Jos C., Villamarn-Salomn, Ricardo, Djalaliev, Peter and Kyle, David (2008): Evaluating the usability of usage controls in electronic collaboration. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 85-92. Available online

p. 95-104

Stedman, Ryan, Yoshida, Kayo and Goldberg, Ian (2008): A user study of off-the-record messaging. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 95-104. Available online


 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 

User-contributed notes

Give us your opinion! Do you have any comments/additions
that you would like other visitors to see?

 
comment You (your email) say: Oct 20th, 2014
#1
Oct 20
Add a thoughtful commentary or note to this page ! 
 

will be spam-protected
How many?
= e.g. "6"
User ExperienceBy submitting you agree to the Site Terms
 
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/conferences/proceedings_of_the_2008_symposium_on_usable_privacy_and_security.html