Proceedings of the 2005 Symposium on Usable Privacy and Security

Publisher
ACM Press
Website
Year
2005
Period
Place
ISBN
Series
SOUPS - Symposium on Usable Privacy and Security
DOI
Volume
Copyright info

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

All years

Articles

Wiedenbeck, Susan, Waters, Jim, Birget, Jean-Camille, Brodskiy, Alex, Memon, Nasir (2005): Authentication using graphical passwords: effects of tolerance and image choice. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 1-12. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p1-wiedenbeck.pdf

DiGioia, Paul, Dourish, Paul (2005): Social navigation as a model for usable security. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 101-108. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p101-digioia.pdf

Garfinkel, Simson L., Miller, Robert C. (2005): Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 13-24. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p13-garfinkel.pdf

Paula, Rogerio de, Ding, Xianghua, Dourish, Paul, Nies, Kari, Pillet, Ben, Redmiles, David F., Ren, Jie, Rode, Jennifer Ann, Filho, Roberto Silva (2005): Two experiences designing for effective security. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 25-34. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p25-depaula.pdf

Brodie, Carolyn, Karat, Clare-Marie, Karat, John, Feng, Jinjuan (2005): Usable security and privacy: a case study of developing privacy management tools. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 35-43. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p35-brodie.pdf

Good, Nathaniel, Dhamija, Rachna, Grossklags, Jens, Thaw, David, Aronowitz, Steven, Mulligan, Deirdre, Konstan, Joseph A. (2005): Stopping spyware at the gate: a user study of privacy, notice and spyware. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 43-52. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p43-good.pdf

Pettersson, John Soren, Fischer-Hübner, Simone, Danielsson, Ninni, Nilsson, Jenny, Bergmann, Mike, Clauss, Sebastian, Kriegelstein, Thomas, Krasemann, Henry (2005): Making PRIME usable. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 53-64. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p53-pettersson.pdf

Iachello, Giovanni, Smith, Ian, Consolvo, Sunny, Chen, Mike, Abowd, Gregory D. (2005): Developing privacy guidelines for social location disclosure applications and services. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 65-76. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p65-iachello.pdf

Dhamija, Rachna, Tygar, J. D. (2005): The battle against phishing: Dynamic Security Skins. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 77-88. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p77-dhamija.pdf

Conti, Gregory, Ahamad, Mustaque, Stasko, John T. (2005): Attacking information visualization system usability overloading and deceiving the human. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 89-100. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p89-conti.pdf