Proceedings of the 2007 Symposium on Usable Privacy and Security

Publisher
ACM Press
Website
Year
2007
Period
Place
ISBN
Series
SOUPS - Symposium on Usable Privacy and Security
DOI
Volume
Copyright info

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

All years

Articles

Chiasson, Sonia, Biddle, Robert, Oorschot, P. C. van (2007): A second look at the usability of click-based graphical passwords. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 1-12. https://cups.cs.cmu.edu/soups/2007/proceedings/p1_chiasson.pdf

Botta, David, Werlinger, Rodrigo, Gagné, André, Beznosov, Konstantin, Iverson, Lee, Fels, Sidney, Fisher, Brian D. (2007): Towards understanding IT security professionals and their tools. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 100-111. https://konstantin.beznosov.net/professional/works/doi/view.php?116

Conti, Gregory, Sobiesk, Edward (2007): An honest man has nothing to fear: user perceptions on web-based information disclosure. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 112-121. https://cups.cs.cmu.edu/soups/2007/proceedings/p112_conti.pdf

Lieberman, Eric, Miller, Robert C. (2007): Facemail: showing faces of recipients to prevent misdirected email. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 122-131. https://www.mit.edu/~rcm/soups07.ppt

Kumar, Manu, Garfinkel, Tal, Boneh, Dan, Winograd, Terry (2007): Reducing shoulder-surfing by using gaze-based password entry. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 13-19. https://cups.cs.cmu.edu/soups/2007/proceedings/p13_kumar.pdf

Krstiae, Ivan, Garfinkel, Simson L. (2007): Bitfrost: the one laptop per child security model. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 132-142. https://cups.cs.cmu.edu/soups/2007/proceedings/p132_krstic.pdf

James, Rajah, Kim, Woo Tae, McDonald, Aleecia M., McGuire, Robert (2007): A usability evaluation of a home monitoring system. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 143-144. https://cups.cs.cmu.edu/soups/2007/posters/p143_james.pdf

Bethencourt, John, Low, Wai Yong, Simmons, Isaac, Williamson, Matthew (2007): Establishing darknet connections: an evaluation of usability and security. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 145-146. https://cups.cs.cmu.edu/soups/2007/posters/p145_bethencourt.pdf

Lim, Johnny (2007): Defeat spyware with anti-screen capture technology using visual persistence. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 147-148. https://cups.cs.cmu.edu/soups/2007/posters/p147_lim.pdf

Werlinger, Rodrigo, Botta, David, Beznosov, Konstantin (2007): Detecting, analyzing and responding to security incidents: a qualitative analysis. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 149-150. https://cups.cs.cmu.edu/soups/2007/posters/p149_werlinger.pdf

Forget, Alain, Chiasson, Sonia, Biddle, Robert (2007): Helping users create better passwords: is this the right approach?. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 151-152. https://cups.cs.cmu.edu/soups/2007/posters/p151_forget.pdf

Heckle, Rosa R., Patrick, Andrew S., Ozok, A. Ant (2007): Perception and acceptance of fingerprint biometric technology. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 153-154. https://cups.cs.cmu.edu/soups/2007/posters/p153_heckle.pdf

Heiner, Andreas P., Asokan, N. (2007): Secure software installation in a mobile environment. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 155-156. https://cups.cs.cmu.edu/soups/2007/posters/p155_heiner.pdf

Strater, Katherine, Richter, Heather (2007): Examining privacy and disclosure in a social networking community. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 157-158. https://cups.cs.cmu.edu/soups/2007/posters/p157_strater.pdf

Marchant, Robert L. (2007): A survey of privacy concerns with dynamic collaborator discovery capabilities. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 159-160. https://cups.cs.cmu.edu/soups/2007/posters/p159_marchant.pdf

Lin, Di, Dunphy, Paul, Olivier, Patrick, Yan, Jeff (2007): Graphical passwords & qualitative spatial relations. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 161-162. https://cups.cs.cmu.edu/soups/2007/posters/p161_lin.pdf

Edman, Matthew, Hipple, Justin (2007): Vidalia: towards a usable Tor GUI. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 163-164. https://cups.cs.cmu.edu/soups/2007/posters/p163_edman.pdf

Dunphy, Paul, Yan, Jeff (2007): Is FacePIN secure and usable?. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 165-166. https://cups.cs.cmu.edu/soups/2007/posters/p165_dunphy.pdf

Gross, Joshua B., Rosson, Mary Beth (2007): End user concern about security and privacy threats. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 167-168. https://cups.cs.cmu.edu/soups/2007/posters/p167_gross.pdf

Bailey, Katelin, Vongsathorn, Linden, Kapadia, Apu, Masone, Chris, Smith, Sean W. (2007): TwoKind authentication: usable authenticators for untrustworthy environments. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 169-170. https://cups.cs.cmu.edu/soups/2007/posters/p169_bailey.pdf

Motahari, Sara, Manikopoulos, Constantine, Hiltz, Roxanne, Jones, Quentin (2007): Seven privacy worries in ubiquitous social computing. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 171-172. https://cups.cs.cmu.edu/soups/2007/posters/p171_motahari.pdf

Heckle, Rosa R., Lutters, Wayne G. (2007): Privacy implications for single sign-on authentication in a hospital environment. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 173-174. https://cups.cs.cmu.edu/soups/2007/posters/p173_heckle.pdf

Dirik, Ahmet Emir, Memon, Nasir, Birget, Jean-Camille (2007): Modeling user choice in the PassPoints graphical password scheme. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 20-28. https://cups.cs.cmu.edu/soups/2007/proceedings/p20_dirik.pdf

Jensen, Carlos, Sarkar, Chandan, Jensen, Christian, Potts, Colin (2007): Tracking website data-collection and privacy practices with the iWatch web crawler. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 29-40. https://cups.cs.cmu.edu/soups/2007/slides/jensen.pdf Slides

Clark, Jeremy, Oorschot, P. C. van, Adams, Carlisle (2007): Usability of anonymous web browsing: an examination of Tor interfaces and deployability. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 41-51. https://cups.cs.cmu.edu/soups/2007/proceedings/p41_clark.pdf

Krishnamurthy, Balachander, Malandrino, Delfina, Wills, Craig E. (2007): Measuring privacy loss and the impact of privacy protection in web browsing. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 52-63. https://cups.cs.cmu.edu/soups/2007/proceedings/p52_krishnamurthy.pdf

Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Vaniea, Kami (2007): Lessons learned from the deployment of a smartphone-based access-control system. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 64-75. https://cups.cs.cmu.edu/soups/2007/proceedings/p64_bauer.pdf

Brustoloni, José Carlos, Villamarín-Salomón, Ricardo (2007): Improving security decisions with polymorphic and audited dialogs. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 76-87. https://cups.cs.cmu.edu/soups/2007/slides/brustoloni.ppt Slides

Sheng, Steve, Magnien, Bryant, Kumaraguru, Ponnurangam, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason, Nunge, Elizabeth (2007): Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall fo. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 88-99. https://cups.cs.cmu.edu/soups/2007/proceedings/p88_sheng.pdf

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,366 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,366 designers enjoy our newsletter—sure you don’t want to receive it?