Proceedings of the 2011 Symposium on Usable Privacy and Security

Publisher
ACM Press
Website
Year
2011
Period
Place
ISBN
Series
SOUPS - Symposium on Usable Privacy and Security
DOI
Volume
Copyright info

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

All years

Articles

Raja, Fahimeh, Hawkey, Kirstie, Hsu, Steven, Wang, Kai-Le Clement, Beznosov, Konstantin (2011): A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warni. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 1. https://dx.doi.org/10.1145/2078827.2078829

Maurer, Max-Emanuel, Luca, Alexander De, Kempe, Sylvia (2011): Using data type based security alert dialogs to raise online security awareness. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 2. https://dx.doi.org/10.1145/2078827.2078830

Sotirakopoulos, Andreas, Hawkey, Kirstie, Beznosov, Konstantin (2011): On the challenges in usable security lab studies: lessons learned from replicating a study. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 3. https://dx.doi.org/10.1145/2078827.2078831

Sun, San-Tsai, Pospisil, Eric, Muslukhov, Ildar, Dindar, Nuray, Hawkey, Kirstie, Beznosov, Konstantin (2011): What makes users refuse web single sign-on?: an empirical investigation of OpenID. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 4. https://dx.doi.org/10.1145/2078827.2078833

Perkoviae, Toni, Li, Shujun, Mumtaz, Asma, Khayam, Syed Ali, Javed, Yousra, Èagalj, Mario (2011): Breaking undercover: exploiting design flaws and nonuniform human behavior. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 5. https://dx.doi.org/10.1145/2078827.2078834

Zakaria, Nur Haryani, Griffiths, David, Brostoff, Sacha, Yan, Jeff (2011): Shoulder surfing defence for recall-based graphical passwords. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 6. https://dx.doi.org/10.1145/2078827.2078835

Jaferian, Pooya, Hawkey, Kirstie, Sotirakopoulos, Andreas, Velez-Rojas, Maria, Beznosov, Konstantin (2011): Heuristics for evaluating IT security management tools. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 7. https://dx.doi.org/10.1145/2078827.2078837

Liu, Gang, Xiang, Guang, Pendleton, Bryan A., Hong, Jason I., Liu, Wenyin (2011): Smartening the crowds: computational techniques for improving human verification to fight . In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 8. https://dx.doi.org/10.1145/2078827.2078838

Zhu, Feng, Carpenter, Sandra, Kulkarni, Ajinkya, Kolimi, Swapna (2011): Reciprocity attacks. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 9. https://dx.doi.org/10.1145/2078827.2078839

Wang, Yang, Norcie, Gregory, Komanduri, Saranga, Acquisti, Alessandro, Leon, Pedro Giovanni, Cranor, Lorrie Faith (2011): "I regretted the minute I pressed share": a qualitative study of regrets on Facebook. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 10. https://dx.doi.org/10.1145/2078827.2078841

Shehab, Mohamed, Marouf, Said, Hudel, Christopher (2011): ROAuth: recommendation based open authorization. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 11. https://dx.doi.org/10.1145/2078827.2078842

King, Jennifer, Lampinen, Airi, Smolen, Alex (2011): Privacy: is there an app for that?. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 12. https://dx.doi.org/10.1145/2078827.2078843

Ion, Iulia, Sachdeva, Niharika, Kumaraguru, Ponnurangam, Èapkun, Srdjan (2011): Home is safer than the cloud!: privacy concerns for consumer cloud storage. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 13. https://dx.doi.org/10.1145/2078827.2078845

Schlegel, Roman, Kapadia, Apu, Lee, Adam J. (2011): Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 14. https://dx.doi.org/10.1145/2078827.2078846

Braunstein, Alex, Granka, Laura, Staddon, Jessica (2011): Indirect content privacy surveys: measuring privacy without asking about it. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 15. https://dx.doi.org/10.1145/2078827.2078847

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,338 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,338 designers enjoy our newsletter—sure you don’t want to receive it?