Upcoming Courses

go to course
Emotional Design: How to make products people will love
91% booked. Starts in 4 days
go to course
UI Design Patterns for Successful Software
83% booked. Starts in 12 days
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Upcoming Courses

go to course
Emotional Design: How to make products people will love
91% booked. Starts in 4 days
go to course
UI Design Patterns for Successful Software
83% booked. Starts in 12 days
 
 

Proceedings of the 2011 Symposium on Usable Privacy and Security


 
Time and place:

2011
Conf. description:
Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.
Help us!
Do you know when the next conference is? If yes, please add it to the calendar!
Series:
This is a preferred venue for people like Lorrie Faith Cranor, Robert W. Reeder, Jason Hong, Konstantin Beznosov, and Lorrie Cranor. Part of the SOUPS - Symposium on Usable Privacy and Security conference series.
Other years:
Publisher:
ACM Press
EDIT

References from this conference (2011)

The following articles are from "Proceedings of the 2011 Symposium on Usable Privacy and Security":

 what's this?

Articles

p. 1

Raja, Fahimeh, Hawkey, Kirstie, Hsu, Steven, Wang, Kai-Le Clement and Beznosov, Konstantin (2011): A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 1. Available online

p. 10

Wang, Yang, Norcie, Gregory, Komanduri, Saranga, Acquisti, Alessandro, Leon, Pedro Giovanni and Cranor, Lorrie Faith (2011): "I regretted the minute I pressed share": a qualitative study of regrets on Facebook. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 10. Available online

p. 11

Shehab, Mohamed, Marouf, Said and Hudel, Christopher (2011): ROAuth: recommendation based open authorization. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 11. Available online

p. 12

King, Jennifer, Lampinen, Airi and Smolen, Alex (2011): Privacy: is there an app for that?. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 12. Available online

p. 13

Ion, Iulia, Sachdeva, Niharika, Kumaraguru, Ponnurangam and apkun, Srdjan (2011): Home is safer than the cloud!: privacy concerns for consumer cloud storage. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 13. Available online

p. 14

Schlegel, Roman, Kapadia, Apu and Lee, Adam J. (2011): Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 14. Available online

p. 15

Braunstein, Alex, Granka, Laura and Staddon, Jessica (2011): Indirect content privacy surveys: measuring privacy without asking about it. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 15. Available online

p. 2

Maurer, Max-Emanuel, Luca, Alexander De and Kempe, Sylvia (2011): Using data type based security alert dialogs to raise online security awareness. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 2. Available online

p. 3

Sotirakopoulos, Andreas, Hawkey, Kirstie and Beznosov, Konstantin (2011): On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 3. Available online

p. 4

Sun, San-Tsai, Pospisil, Eric, Muslukhov, Ildar, Dindar, Nuray, Hawkey, Kirstie and Beznosov, Konstantin (2011): What makes users refuse web single sign-on?: an empirical investigation of OpenID. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 4. Available online

p. 5

Perkoviae, Toni, Li, Shujun, Mumtaz, Asma, Khayam, Syed Ali, Javed, Yousra and agalj, Mario (2011): Breaking undercover: exploiting design flaws and nonuniform human behavior. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 5. Available online

p. 6

Zakaria, Nur Haryani, Griffiths, David, Brostoff, Sacha and Yan, Jeff (2011): Shoulder surfing defence for recall-based graphical passwords. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 6. Available online

p. 7

Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas, Velez-Rojas, Maria and Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 7. Available online

p. 8

Liu, Gang, Xiang, Guang, Pendleton, Bryan A., Hong, Jason I. and Liu, Wenyin (2011): Smartening the crowds: computational techniques for improving human verification to fight phishing scams. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 8. Available online

p. 9

Zhu, Feng, Carpenter, Sandra, Kulkarni, Ajinkya and Kolimi, Swapna (2011): Reciprocity attacks. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 9. Available online


 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 

User-contributed notes

Give us your opinion! Do you have any comments/additions
that you would like other visitors to see?

 
comment You (your email) say: Oct 21st, 2014
#1
Oct 21
Add a thoughtful commentary or note to this page ! 
 

will be spam-protected
How many?
= e.g. "6"
User ExperienceBy submitting you agree to the Site Terms
 
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/conferences/proceedings_of_the_2011_symposium_on_usable_privacy_and_security.html