Upcoming Courses

go to course
User Experience: The Beginner's Guide
91% booked. Starts in 4 days
go to course
User-Centred Design - Module 2
90% booked. Starts in 5 days
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Upcoming Courses

go to course
User Experience: The Beginner's Guide
91% booked. Starts in 4 days
go to course
User-Centred Design - Module 2
90% booked. Starts in 5 days
 
 

Proceedings of the 2012 Symposium on Usable Privacy and Security


 
Time and place:

2012
Conf. description:
Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.
Help us!
Do you know when the next conference is? If yes, please add it to the calendar!
Series:
This is a preferred venue for people like Lorrie Faith Cranor, Robert W. Reeder, Jason Hong, Konstantin Beznosov, and Lorrie Cranor. Part of the SOUPS - Symposium on Usable Privacy and Security conference series.
Other years:
EDIT

The following articles are from "Proceedings of the 2012 Symposium on Usable Privacy and Security":

 what's this?

Articles

p. 1

Chin, Erika, Felt, Adrienne Porter, Sekar, Vyas and Wagner, David (2012): Measuring user confidence in smartphone security and privacy. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 1. Available online

p. 10

Staddon, Jessica, Huffaker, David, Brown, Larkin and Sedley, Aaron (2012): Are privacy concerns a turn-off?: engagement and privacy in social networks. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 10. Available online

p. 11

Fahl, Sascha, Harbach, Marian, Muders, Thomas, Smith, Matthew and Sander, Uwe (2012): Helping Johnny 2.0 to encrypt his Facebook conversations. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 11. Available online

p. 12

Watson, Jason, Besmer, Andrew and Lipford, Heather Richter (2012): +Your circles: sharing behavior on Google+. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 12. Available online

p. 13

Mazzia, Alessandra, LeFevre, Kristen and Adar, Eytan (2012): The PViz comprehension tool for social network privacy settings. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 13. Available online

p. 14

Krishnan, Vivek, Tripunitara, Mahesh V., Chik, Kinson and Bergstrom, Tony (2012): Relating declarative semantics and usability in access control. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 14. Available online

p. 2

Hayashi, Eiji, Riva, Oriana, Strauss, Karin, Brush, A. J. Bernheim and Schechter, Stuart (2012): Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 2. Available online

p. 3

Felt, Adrienne Porter, Ha, Elizabeth, Egelman, Serge, Haney, Ariel, Chin, Erika and Wagner, David (2012): Android permissions: user attention, comprehension, and behavior. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 3. Available online

p. 4

Ur, Blase, Leon, Pedro Giovanni, Cranor, Lorrie Faith, Shay, Richard and Wang, Yang (2012): Smart, useful, scary, creepy: perceptions of online behavioral advertising. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 4. Available online

p. 5

Patil, Sameer, Norcie, Greg, Kapadia, Apu and Lee, Adam J. (2012): Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 5. Available online

p. 6

Rader, Emilee, Wash, Rick and Brooks, Brandon (2012): Stories as informal lessons about security. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 6. Available online

p. 7

Shay, Richard, Kelley, Patrick Gage, Komanduri, Saranga, Mazurek, Michelle L., Ur, Blase, Vidas, Timothy, Bauer, Lujo, Christin, Nicolas and Cranor, Lorrie Faith (2012): Correct horse battery staple: exploring the usability of system-assigned passphrases. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 7. Available online

p. 8

Wright, Nicholas, Patrick, Andrew S. and Biddle, Robert (2012): Do you see your password?: applying recognition to textual passwords. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 8. Available online

p. 9

Johnson, Maritza, Egelman, Serge and Bellovin, Steven M. (2012): Facebook and privacy: it's complicated. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 9. Available online


 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 

User-contributed notes

Give us your opinion! Do you have any comments/additions
that you would like other visitors to see?

 
comment You (your email) say: Nov 22nd, 2014
#1
Nov 22
Add a thoughtful commentary or note to this page ! 
 

will be spam-protected
How many?
= e.g. "6"
User ExperienceBy submitting you agree to the Site Terms
 
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/conferences/proceedings_of_the_2012_symposium_on_usable_privacy_and_security.html