Proceedings of the 2009 Symposium on Usable Privacy and Security
- Publisher
- ACM Press
- Website
- Year
- 2009
- Period
- Place
- ISBN
- Series
- SOUPS - Symposium on Usable Privacy and Security
- DOI
- Volume
- Copyright info
Description
All years
Articles
Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2009): Revealing hidden context: improving mental models of personal firewall users. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 1. https://doi.acm.org/10.1145/1572532.1572534
Besmer, Andrew, Lipford, Heather Richter, Shehab, Mohamed, Cheek, Gorrell (2009): Social applications: exploring a more secure framework. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 2. https://doi.acm.org/10.1145/1572532.1572535
Kumaraguru, Ponnurangam, Cranshaw, Justin, Acquisti, Alessandro, Cranor, Lorrie, Hong, Jason, Blair, Mary Ann, Pham, Theodore (2009): School of phish: a real-word evaluation of anti-phishing training. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 3. https://doi.acm.org/10.1145/1572532.1572536
Kelley, Patrick Gage, Bresee, Joanna, Cranor, Lorrie Faith, Reeder, Robert W. (2009): A \"nutrition label\" for privacy. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 4. https://doi.acm.org/10.1145/1572532.1572538
Goecks, Jeremy, Edwards, W. Keith, Mynatt, Elizabeth D. (2009): Challenges in supporting end-user privacy and security management with social navigation. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 5. https://doi.acm.org/10.1145/1572532.1572539
Little, Linda, Sillence, Elizabeth, Briggs, Pam (2009): Ubiquitous systems and the family: thoughts about the networked home. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 6. https://doi.acm.org/10.1145/1572532.1572540
Luca, Alexander De, Denzel, Martin, Hussmann, Heinrich (2009): Look into my eyes!: can you guess my password?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 7. https://doi.acm.org/10.1145/1572532.1572542
Just, Mike, Aspinall, David (2009): Personal choice and challenge questions: a security and usability assessment. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 8. https://doi.acm.org/10.1145/1572532.1572543
Schechter, Stuart, Reeder, Robert W. (2009): 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentic. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 9. https://doi.acm.org/10.1145/1572532.1572544
Kobsa, Alfred, Sonawalla, Rahim, Tsudik, Gene, Uzun, Ersin, Wang, Yang (2009): Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 10. https://doi.acm.org/10.1145/1572532.1572546
Kainda, Ronald, Flechais, Ivan, Roscoe, A. W. (2009): Usability and security of out-of-band channels in secure device pairing protocols. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 11. https://doi.acm.org/10.1145/1572532.1572547
Halprin, Ran, Naor, Moni (2009): Games for extracting randomness. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 12. https://doi.acm.org/10.1145/1572532.1572548
Chow, Richard, Oberst, Ian, Staddon, Jessica (2009): Sanitization\'s slippery slope: the design and study of a text revision assistant. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 13. https://doi.acm.org/10.1145/1572532.1572550
Kluever, Kurt Alfred, Zanibbi, Richard (2009): Balancing usability and security in a video CAPTCHA. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 14. https://doi.acm.org/10.1145/1572532.1572551
Smetters, D. K., Good, Nathan (2009): How users use access control. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 15. https://doi.acm.org/10.1145/1572532.1572552
Sasse, M. Angela, Karat, Clare-Marie, Maxion, Roy (2009): Designing and evaluating usable security and privacy technology. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 16. https://doi.acm.org/10.1145/1572532.1572554
Weaver, Nicholas (2009): Think Evil (tm). In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 17. https://doi.acm.org/10.1145/1572532.1572555
Peeters, Roel, Kohlweiss, Markulf, Preneel, Bart, Sulmon, Nicky (2009): Threshold things that think: usable authorization for resharing. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 18. https://doi.acm.org/10.1145/1572532.1572557
Karp, Alan, Stiegler, Marc, Close, Tyler (2009): Not one click for security?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 19. https://doi.acm.org/10.1145/1572532.1572558
Church, Luke, Anderson, Jonathan, Bonneau, Joesph, Stajano, Frank (2009): Privacy stories: confidence in privacy behaviors through end user programming. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 20. https://doi.acm.org/10.1145/1572532.1572559
Gao, Haichang, Liu, Xiyang (2009): A new graphical password scheme against spyware by using CAPTCHA. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 21. https://doi.acm.org/10.1145/1572532.1572560
Benisch, Michael, Kelley, Patrick Gage, Sadeh, Norman, Sandholm, Tuomas, Tsai, Janice, Cranor, Lorrie Faith, Drielsma, Paul Hankes (2009): The impact of expressiveness on the effectiveness of privacy mechanisms for location-shari. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 22. https://doi.acm.org/10.1145/1572532.1572561
Motahari, Sara, Ziavras, Sotirios, Jones, Quentin (2009): Designing for different levels of social inference risk. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 23. https://doi.acm.org/10.1145/1572532.1572562
Zenebe, Azene, Tuner, Claude, Feng, Jinjuan, Lazar, Jonathan, O\'Leary, Mike (2009): Integrating usability and accessibility in information assurance education. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 24. https://doi.acm.org/10.1145/1572532.1572563
Hayashi, Eiji, Hong, Jason, Christin, Nicolas (2009): Educated guess on graphical authentication schemes: vulnerabilities and countermeasures. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 25. https://doi.acm.org/10.1145/1572532.1572564
Likarish, Peter, Dunbar, Don, Hourcade, Juan Pablo, Jung, Eunjin (2009): BayeShield: conversational anti-phishing user interface. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 26. https://doi.acm.org/10.1145/1572532.1572565
Maetz, Yves, Onno, Stéphane, Heen, Olivier (2009): Recall-a-story, a story-telling graphical password system. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 27. https://doi.acm.org/10.1145/1572532.1572566
Fisler, Kathi, Krishnamurthi, Shriram (2009): Escape from the matrix: lessons from a case-study in access-control requirements. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 28. https://doi.acm.org/10.1145/1572532.1572567
Tsai, Janice, Egelman, Serge, Cranor, Lorrie, Acquisti, Alessandro (2009): The impact of privacy indicators on search engine browsing patterns. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 29. https://doi.acm.org/10.1145/1572532.1572568
Bonneau, Joseph, Anderson, Jonathan, Church, Luke (2009): Privacy suites: shared privacy for social networks. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 30. https://doi.acm.org/10.1145/1572532.1572569
McQuaid, Michael, Zheng, Kai, Melville, Nigel, Green, Lee (2009): Usable deidentification of sensitive patient care data. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 31. https://doi.acm.org/10.1145/1572532.1572570
Toch, Eran, Ravichandran, Ramprasad, Cranor, Lorrie, Drielsma, Paul, Hong, Jason, Kelley, Patrick, Sadeh, Norman, Tsai, Janice (2009): Analyzing use of privacy policy attributes in a location sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 32. https://doi.acm.org/10.1145/1572532.1572571
Thomas, Keerthi, Mancini, Clara, Jedrzejczyk, Lukasz, Bandara, Arosha K., Joinson, Adam, Price, Blaine A., Rogers, Yvonne, Nuseibeh, Bashar (2009): Studying location privacy in mobile applications: \'predator vs. prey\' probes. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 33. https://doi.acm.org/10.1145/1572532.1572572
Saxena, Nitesh, Uddin, Md. Borhan, Voris, Jonathan (2009): Treat \'em like other devices: user authentication of multiple personal RFID tags. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 34. https://doi.acm.org/10.1145/1572532.1572573
Kay, Matthew, Terry, Michael (2009): Textured agreements: re-envisioning electronic consent. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 35. https://doi.acm.org/10.1145/1572532.1572574
Jaferian, Pooya, Botta, David, Hawkey, Kirstie, Beznosov, Konstantin (2009): A multi-method approach for user-centered design of identity management systems. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 36. https://doi.acm.org/10.1145/1572532.1572575
Lucas, Matthew, Borisov, Nikita (2009): flyByNight: mitigating the privacy risks of social networking. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 37. https://doi.acm.org/10.1145/1572532.1572577
Karlof, Chris, Tygar, J. D., Wagner, David (2009): Conditioned-safe ceremonies and a user study of an application to web authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 38. https://doi.acm.org/10.1145/1572532.1572578
Bicakci, Kemal, Yuceel, Mustafa, Erdeniz, Burak, Gurbaslar, Hakan, Atalay, Nart Bedin (2009): Graphical passwords as browser extension: implementation and usability study. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 39. https://doi.acm.org/10.1145/1572532.1572579
Schechter, Stuart, Brush, A. J. Bernheim, Egelman, Serge (2009): It\'s no secret: measuring the security and reliability of authentication via \'secret\' q. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 40. https://doi.acm.org/10.1145/1572532.1572580
Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 41. https://doi.acm.org/10.1145/1572532.1572581
Reeder, Robert W., Kelley, Patrick Gage, McDonald, Aleecia M., Cranor, Lorrie Faith (2009): A user study of the expandable grid applied to P3P privacy policy visualization. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 42. https://doi.acm.org/10.1145/1572532.1572582
Tsai, Janice, Kelley, Patrick, Drielsma, Paul Hankes, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 43. https://doi.acm.org/10.1145/1572532.1572583
Hasegawa, Madoka, Christin, Nicolas, Hayashi, Eiji (2009): New directions in multisensory authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 44. https://doi.acm.org/10.1145/1572532.1572584
Golle, Philippe (2009): Machine learning attacks against the Asirra CAPTCHA. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 45. https://doi.acm.org/10.1145/1572532.1572585
McDonald, Aleecia M., Reeder, Robert W., Kelley, Patrick Gage, Cranor, Lorrie Faith (2009): A comparative study of online privacy policies and formats. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 46. https://doi.acm.org/10.1145/1572532.1572586
Ravichandran, Ramprasad, Benisch, Michael, Kelley, Patrick Gauge, Sadeh, Norman (2009): Capturing social networking privacy preferences: can default policies help alleviate trade. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 47. https://doi.acm.org/10.1145/1572532.1572587
Sachs, Eric (2009): Redirects to login pages are bad, or are they?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 48. https://doi.acm.org/10.1145/1572532.1572589
Gillis, Nancy (2009): Short and long term research suggestions for NSF and NIST. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 49. https://doi.acm.org/10.1145/1572532.1572591
Patrick, Andrew (2009): Ecological validity in studies of security and human behaviour. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 50. https://doi.acm.org/10.1145/1572532.1572592
Garfinkel, Simson (2009): Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and . In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 51. https://doi.acm.org/10.1145/1572532.1572593
Zurko, Mary Ellen (2009): Technology transfer of successful usable security research into product. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 52. https://doi.acm.org/10.1145/1572532.1572594
Little, Linda (2009): The family and communication technologies. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 53. https://doi.acm.org/10.1145/1572532.1572595
Karvonen, Kristiina (2009): How does the emergence of reputation mechanisms affect the overall trust formation mechani. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 54. https://doi.acm.org/10.1145/1572532.1572596