Proceedings of the 2009 Symposium on Usable Privacy and Security

Publisher
ACM Press
Website
Year
2009
Period
Place
ISBN
Series
SOUPS - Symposium on Usable Privacy and Security
DOI
Volume
Copyright info

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

All years

Articles

Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2009): Revealing hidden context: improving mental models of personal firewall users. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 1. https://doi.acm.org/10.1145/1572532.1572534

Besmer, Andrew, Lipford, Heather Richter, Shehab, Mohamed, Cheek, Gorrell (2009): Social applications: exploring a more secure framework. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 2. https://doi.acm.org/10.1145/1572532.1572535

Kumaraguru, Ponnurangam, Cranshaw, Justin, Acquisti, Alessandro, Cranor, Lorrie, Hong, Jason, Blair, Mary Ann, Pham, Theodore (2009): School of phish: a real-word evaluation of anti-phishing training. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 3. https://doi.acm.org/10.1145/1572532.1572536

Kelley, Patrick Gage, Bresee, Joanna, Cranor, Lorrie Faith, Reeder, Robert W. (2009): A \"nutrition label\" for privacy. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 4. https://doi.acm.org/10.1145/1572532.1572538

Goecks, Jeremy, Edwards, W. Keith, Mynatt, Elizabeth D. (2009): Challenges in supporting end-user privacy and security management with social navigation. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 5. https://doi.acm.org/10.1145/1572532.1572539

Little, Linda, Sillence, Elizabeth, Briggs, Pam (2009): Ubiquitous systems and the family: thoughts about the networked home. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 6. https://doi.acm.org/10.1145/1572532.1572540

Luca, Alexander De, Denzel, Martin, Hussmann, Heinrich (2009): Look into my eyes!: can you guess my password?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 7. https://doi.acm.org/10.1145/1572532.1572542

Just, Mike, Aspinall, David (2009): Personal choice and challenge questions: a security and usability assessment. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 8. https://doi.acm.org/10.1145/1572532.1572543

Schechter, Stuart, Reeder, Robert W. (2009): 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentic. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 9. https://doi.acm.org/10.1145/1572532.1572544

Kobsa, Alfred, Sonawalla, Rahim, Tsudik, Gene, Uzun, Ersin, Wang, Yang (2009): Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 10. https://doi.acm.org/10.1145/1572532.1572546

Kainda, Ronald, Flechais, Ivan, Roscoe, A. W. (2009): Usability and security of out-of-band channels in secure device pairing protocols. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 11. https://doi.acm.org/10.1145/1572532.1572547

Halprin, Ran, Naor, Moni (2009): Games for extracting randomness. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 12. https://doi.acm.org/10.1145/1572532.1572548

Chow, Richard, Oberst, Ian, Staddon, Jessica (2009): Sanitization\'s slippery slope: the design and study of a text revision assistant. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 13. https://doi.acm.org/10.1145/1572532.1572550

Kluever, Kurt Alfred, Zanibbi, Richard (2009): Balancing usability and security in a video CAPTCHA. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 14. https://doi.acm.org/10.1145/1572532.1572551

Smetters, D. K., Good, Nathan (2009): How users use access control. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 15. https://doi.acm.org/10.1145/1572532.1572552

Sasse, M. Angela, Karat, Clare-Marie, Maxion, Roy (2009): Designing and evaluating usable security and privacy technology. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 16. https://doi.acm.org/10.1145/1572532.1572554

Weaver, Nicholas (2009): Think Evil (tm). In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 17. https://doi.acm.org/10.1145/1572532.1572555

Peeters, Roel, Kohlweiss, Markulf, Preneel, Bart, Sulmon, Nicky (2009): Threshold things that think: usable authorization for resharing. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 18. https://doi.acm.org/10.1145/1572532.1572557

Karp, Alan, Stiegler, Marc, Close, Tyler (2009): Not one click for security?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 19. https://doi.acm.org/10.1145/1572532.1572558

Church, Luke, Anderson, Jonathan, Bonneau, Joesph, Stajano, Frank (2009): Privacy stories: confidence in privacy behaviors through end user programming. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 20. https://doi.acm.org/10.1145/1572532.1572559

Gao, Haichang, Liu, Xiyang (2009): A new graphical password scheme against spyware by using CAPTCHA. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 21. https://doi.acm.org/10.1145/1572532.1572560

Benisch, Michael, Kelley, Patrick Gage, Sadeh, Norman, Sandholm, Tuomas, Tsai, Janice, Cranor, Lorrie Faith, Drielsma, Paul Hankes (2009): The impact of expressiveness on the effectiveness of privacy mechanisms for location-shari. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 22. https://doi.acm.org/10.1145/1572532.1572561

Motahari, Sara, Ziavras, Sotirios, Jones, Quentin (2009): Designing for different levels of social inference risk. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 23. https://doi.acm.org/10.1145/1572532.1572562

Zenebe, Azene, Tuner, Claude, Feng, Jinjuan, Lazar, Jonathan, O\'Leary, Mike (2009): Integrating usability and accessibility in information assurance education. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 24. https://doi.acm.org/10.1145/1572532.1572563

Hayashi, Eiji, Hong, Jason, Christin, Nicolas (2009): Educated guess on graphical authentication schemes: vulnerabilities and countermeasures. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 25. https://doi.acm.org/10.1145/1572532.1572564

Likarish, Peter, Dunbar, Don, Hourcade, Juan Pablo, Jung, Eunjin (2009): BayeShield: conversational anti-phishing user interface. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 26. https://doi.acm.org/10.1145/1572532.1572565

Maetz, Yves, Onno, Stéphane, Heen, Olivier (2009): Recall-a-story, a story-telling graphical password system. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 27. https://doi.acm.org/10.1145/1572532.1572566

Fisler, Kathi, Krishnamurthi, Shriram (2009): Escape from the matrix: lessons from a case-study in access-control requirements. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 28. https://doi.acm.org/10.1145/1572532.1572567

Tsai, Janice, Egelman, Serge, Cranor, Lorrie, Acquisti, Alessandro (2009): The impact of privacy indicators on search engine browsing patterns. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 29. https://doi.acm.org/10.1145/1572532.1572568

Bonneau, Joseph, Anderson, Jonathan, Church, Luke (2009): Privacy suites: shared privacy for social networks. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 30. https://doi.acm.org/10.1145/1572532.1572569

McQuaid, Michael, Zheng, Kai, Melville, Nigel, Green, Lee (2009): Usable deidentification of sensitive patient care data. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 31. https://doi.acm.org/10.1145/1572532.1572570

Toch, Eran, Ravichandran, Ramprasad, Cranor, Lorrie, Drielsma, Paul, Hong, Jason, Kelley, Patrick, Sadeh, Norman, Tsai, Janice (2009): Analyzing use of privacy policy attributes in a location sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 32. https://doi.acm.org/10.1145/1572532.1572571

Thomas, Keerthi, Mancini, Clara, Jedrzejczyk, Lukasz, Bandara, Arosha K., Joinson, Adam, Price, Blaine A., Rogers, Yvonne, Nuseibeh, Bashar (2009): Studying location privacy in mobile applications: \'predator vs. prey\' probes. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 33. https://doi.acm.org/10.1145/1572532.1572572

Saxena, Nitesh, Uddin, Md. Borhan, Voris, Jonathan (2009): Treat \'em like other devices: user authentication of multiple personal RFID tags. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 34. https://doi.acm.org/10.1145/1572532.1572573

Kay, Matthew, Terry, Michael (2009): Textured agreements: re-envisioning electronic consent. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 35. https://doi.acm.org/10.1145/1572532.1572574

Jaferian, Pooya, Botta, David, Hawkey, Kirstie, Beznosov, Konstantin (2009): A multi-method approach for user-centered design of identity management systems. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 36. https://doi.acm.org/10.1145/1572532.1572575

Lucas, Matthew, Borisov, Nikita (2009): flyByNight: mitigating the privacy risks of social networking. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 37. https://doi.acm.org/10.1145/1572532.1572577

Karlof, Chris, Tygar, J. D., Wagner, David (2009): Conditioned-safe ceremonies and a user study of an application to web authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 38. https://doi.acm.org/10.1145/1572532.1572578

Bicakci, Kemal, Yuceel, Mustafa, Erdeniz, Burak, Gurbaslar, Hakan, Atalay, Nart Bedin (2009): Graphical passwords as browser extension: implementation and usability study. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 39. https://doi.acm.org/10.1145/1572532.1572579

Schechter, Stuart, Brush, A. J. Bernheim, Egelman, Serge (2009): It\'s no secret: measuring the security and reliability of authentication via \'secret\' q. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 40. https://doi.acm.org/10.1145/1572532.1572580

Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 41. https://doi.acm.org/10.1145/1572532.1572581

Reeder, Robert W., Kelley, Patrick Gage, McDonald, Aleecia M., Cranor, Lorrie Faith (2009): A user study of the expandable grid applied to P3P privacy policy visualization. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 42. https://doi.acm.org/10.1145/1572532.1572582

Tsai, Janice, Kelley, Patrick, Drielsma, Paul Hankes, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 43. https://doi.acm.org/10.1145/1572532.1572583

Hasegawa, Madoka, Christin, Nicolas, Hayashi, Eiji (2009): New directions in multisensory authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 44. https://doi.acm.org/10.1145/1572532.1572584

Golle, Philippe (2009): Machine learning attacks against the Asirra CAPTCHA. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 45. https://doi.acm.org/10.1145/1572532.1572585

McDonald, Aleecia M., Reeder, Robert W., Kelley, Patrick Gage, Cranor, Lorrie Faith (2009): A comparative study of online privacy policies and formats. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 46. https://doi.acm.org/10.1145/1572532.1572586

Ravichandran, Ramprasad, Benisch, Michael, Kelley, Patrick Gauge, Sadeh, Norman (2009): Capturing social networking privacy preferences: can default policies help alleviate trade. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 47. https://doi.acm.org/10.1145/1572532.1572587

Sachs, Eric (2009): Redirects to login pages are bad, or are they?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 48. https://doi.acm.org/10.1145/1572532.1572589

Gillis, Nancy (2009): Short and long term research suggestions for NSF and NIST. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 49. https://doi.acm.org/10.1145/1572532.1572591

Patrick, Andrew (2009): Ecological validity in studies of security and human behaviour. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 50. https://doi.acm.org/10.1145/1572532.1572592

Garfinkel, Simson (2009): Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and . In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 51. https://doi.acm.org/10.1145/1572532.1572593

Zurko, Mary Ellen (2009): Technology transfer of successful usable security research into product. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 52. https://doi.acm.org/10.1145/1572532.1572594

Little, Linda (2009): The family and communication technologies. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 53. https://doi.acm.org/10.1145/1572532.1572595

Karvonen, Kristiina (2009): How does the emergence of reputation mechanisms affect the overall trust formation mechani. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 54. https://doi.acm.org/10.1145/1572532.1572596

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,554 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,554 designers enjoy our newsletter—sure you don’t want to receive it?