Upcoming Courses

go to course
User Research - Methods and Best Practices
Starts tomorrow LAST CALL!
go to course
Get Your First Job as a UX or Interaction Designer
Starts the day after tomorrow !
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Glossary of Human Computer Interaction
by Mads Soegaard and Rikke Friis Dam
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Upcoming Courses

go to course
User Research - Methods and Best Practices
Starts tomorrow LAST CALL!
go to course
Get Your First Job as a UX or Interaction Designer
Starts the day after tomorrow !
 
 

Proceedings of the 2005 Symposium on Usable Privacy and Security


 
Time and place:

2005
Conf. description:
Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.
Help us!
Do you know when the next conference is? If yes, please add it to the calendar!
Series:
This is a preferred venue for people like Lorrie Faith Cranor, Robert W. Reeder, Jason Hong, Konstantin Beznosov, and Lorrie Cranor. Part of the SOUPS - Symposium on Usable Privacy and Security conference series.
Other years:
Publisher:
ACM Press
EDIT

References from this conference (2005)

The following articles are from "Proceedings of the 2005 Symposium on Usable Privacy and Security":

 what's this?

Articles

p. 1-12

Wiedenbeck, Susan, Waters, Jim, Birget, Jean-Camille, Brodskiy, Alex and Memon, Nasir (2005): Authentication using graphical passwords: effects of tolerance and image choice. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 1-12. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p1-wiedenbeck.pdf

p. 101-108

DiGioia, Paul and Dourish, Paul (2005): Social navigation as a model for usable security. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 101-108. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p101-digioia.pdf

p. 13-24

Garfinkel, Simson L. and Miller, Robert C. (2005): Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 13-24. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p13-garfinkel.pdf

p. 25-34

Paula, Rogerio de, Ding, Xianghua, Dourish, Paul, Nies, Kari, Pillet, Ben, Redmiles, David F., Ren, Jie, Rode, Jennifer Ann and Filho, Roberto Silva (2005): Two experiences designing for effective security. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 25-34. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p25-depaula.pdf

p. 35-43

Brodie, Carolyn, Karat, Clare-Marie, Karat, John and Feng, Jinjuan (2005): Usable security and privacy: a case study of developing privacy management tools. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 35-43. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p35-brodie.pdf

p. 43-52

Good, Nathaniel, Dhamija, Rachna, Grossklags, Jens, Thaw, David, Aronowitz, Steven, Mulligan, Deirdre and Konstan, Joseph A. (2005): Stopping spyware at the gate: a user study of privacy, notice and spyware. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 43-52. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p43-good.pdf

p. 53-64

Pettersson, John Soren, Fischer-Hbner, Simone, Danielsson, Ninni, Nilsson, Jenny, Bergmann, Mike, Clauss, Sebastian, Kriegelstein, Thomas and Krasemann, Henry (2005): Making PRIME usable. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 53-64. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p53-pettersson.pdf

p. 65-76

Iachello, Giovanni, Smith, Ian, Consolvo, Sunny, Chen, Mike and Abowd, Gregory D. (2005): Developing privacy guidelines for social location disclosure applications and services. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 65-76. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p65-iachello.pdf

p. 77-88

Dhamija, Rachna and Tygar, J. D. (2005): The battle against phishing: Dynamic Security Skins. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 77-88. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p77-dhamija.pdf

p. 89-100

Conti, Gregory, Ahamad, Mustaque and Stasko, John T. (2005): Attacking information visualization system usability overloading and deceiving the human. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 89-100. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p89-conti.pdf


 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 

User-contributed notes

Give us your opinion! Do you have any comments/additions
that you would like other visitors to see?

 
comment You (your email) say: Sep 3rd, 2015
#1
Sep 3
Add a thoughtful commentary or note to this page ! 
 

will be spam-protected
How many?
= e.g. "6"
User ExperienceBy submitting you agree to the Site Terms
 
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/conferences/proceedings_of_the_2005_symposium_on_usable_privacy_and_security.html