Upcoming Courses

go to course
User Research - Methods and Best Practices
Starts tomorrow LAST CALL!
go to course
Get Your First Job as a UX or Interaction Designer
Starts the day after tomorrow !
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Glossary of Human Computer Interaction
by Mads Soegaard and Rikke Friis Dam
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Upcoming Courses

go to course
User Research - Methods and Best Practices
Starts tomorrow LAST CALL!
go to course
Get Your First Job as a UX or Interaction Designer
Starts the day after tomorrow !
 
 

Proceedings of the 2007 Symposium on Usable Privacy and Security


 
Time and place:

2007
Conf. description:
Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.
Help us!
Do you know when the next conference is? If yes, please add it to the calendar!
Series:
This is a preferred venue for people like Lorrie Faith Cranor, Robert W. Reeder, Jason Hong, Konstantin Beznosov, and Lorrie Cranor. Part of the SOUPS - Symposium on Usable Privacy and Security conference series.
Other years:
Publisher:
ACM Press
EDIT

References from this conference (2007)

The following articles are from "Proceedings of the 2007 Symposium on Usable Privacy and Security":

 what's this?

Articles

p. 1-12

Chiasson, Sonia, Biddle, Robert and Oorschot, P. C. van (2007): A second look at the usability of click-based graphical passwords. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 1-12. http://cups.cs.cmu.edu/soups/2007/proceedings/p1_chiasson.pdf

p. 100-111

Botta, David, Werlinger, Rodrigo, Gagn, Andr, Beznosov, Konstantin, Iverson, Lee, Fels, Sidney and Fisher, Brian D. (2007): Towards understanding IT security professionals and their tools. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 100-111. http://konstantin.beznosov.net/professional/works/doi/view.php?116

p. 112-121

Conti, Gregory and Sobiesk, Edward (2007): An honest man has nothing to fear: user perceptions on web-based information disclosure. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 112-121. http://cups.cs.cmu.edu/soups/2007/proceedings/p112_conti.pdf

p. 122-131

Lieberman, Eric and Miller, Robert C. (2007): Facemail: showing faces of recipients to prevent misdirected email. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 122-131. http://www.mit.edu/~rcm/soups07.ppt

p. 13-19

Kumar, Manu, Garfinkel, Tal, Boneh, Dan and Winograd, Terry (2007): Reducing shoulder-surfing by using gaze-based password entry. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 13-19. http://cups.cs.cmu.edu/soups/2007/proceedings/p13_kumar.pdf

p. 132-142

Krstiae, Ivan and Garfinkel, Simson L. (2007): Bitfrost: the one laptop per child security model. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 132-142. http://cups.cs.cmu.edu/soups/2007/proceedings/p132_krstic.pdf

p. 143-144

James, Rajah, Kim, Woo Tae, McDonald, Aleecia M. and McGuire, Robert (2007): A usability evaluation of a home monitoring system. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 143-144. http://cups.cs.cmu.edu/soups/2007/posters/p143_james.pdf

p. 145-146

Bethencourt, John, Low, Wai Yong, Simmons, Isaac and Williamson, Matthew (2007): Establishing darknet connections: an evaluation of usability and security. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 145-146. http://cups.cs.cmu.edu/soups/2007/posters/p145_bethencourt.pdf

p. 147-148

Lim, Johnny (2007): Defeat spyware with anti-screen capture technology using visual persistence. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 147-148. http://cups.cs.cmu.edu/soups/2007/posters/p147_lim.pdf

p. 149-150

Werlinger, Rodrigo, Botta, David and Beznosov, Konstantin (2007): Detecting, analyzing and responding to security incidents: a qualitative analysis. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 149-150. http://cups.cs.cmu.edu/soups/2007/posters/p149_werlinger.pdf

p. 151-152

Forget, Alain, Chiasson, Sonia and Biddle, Robert (2007): Helping users create better passwords: is this the right approach?. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 151-152. http://cups.cs.cmu.edu/soups/2007/posters/p151_forget.pdf

p. 153-154

Heckle, Rosa R., Patrick, Andrew S. and Ozok, A. Ant (2007): Perception and acceptance of fingerprint biometric technology. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 153-154. http://cups.cs.cmu.edu/soups/2007/posters/p153_heckle.pdf

p. 155-156

Heiner, Andreas P. and Asokan, N. (2007): Secure software installation in a mobile environment. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 155-156. http://cups.cs.cmu.edu/soups/2007/posters/p155_heiner.pdf

p. 157-158

Strater, Katherine and Richter, Heather (2007): Examining privacy and disclosure in a social networking community. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 157-158. http://cups.cs.cmu.edu/soups/2007/posters/p157_strater.pdf

p. 159-160

Marchant, Robert L. (2007): A survey of privacy concerns with dynamic collaborator discovery capabilities. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 159-160. http://cups.cs.cmu.edu/soups/2007/posters/p159_marchant.pdf

p. 161-162

Lin, Di, Dunphy, Paul, Olivier, Patrick and Yan, Jeff (2007): Graphical passwords & qualitative spatial relations. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 161-162. http://cups.cs.cmu.edu/soups/2007/posters/p161_lin.pdf

p. 163-164

Edman, Matthew and Hipple, Justin (2007): Vidalia: towards a usable Tor GUI. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 163-164. http://cups.cs.cmu.edu/soups/2007/posters/p163_edman.pdf

p. 165-166

Dunphy, Paul and Yan, Jeff (2007): Is FacePIN secure and usable?. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 165-166. http://cups.cs.cmu.edu/soups/2007/posters/p165_dunphy.pdf

p. 167-168

Gross, Joshua B. and Rosson, Mary Beth (2007): End user concern about security and privacy threats. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 167-168. http://cups.cs.cmu.edu/soups/2007/posters/p167_gross.pdf

p. 169-170

Bailey, Katelin, Vongsathorn, Linden, Kapadia, Apu, Masone, Chris and Smith, Sean W. (2007): TwoKind authentication: usable authenticators for untrustworthy environments. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 169-170. http://cups.cs.cmu.edu/soups/2007/posters/p169_bailey.pdf

p. 171-172

Motahari, Sara, Manikopoulos, Constantine, Hiltz, Roxanne and Jones, Quentin (2007): Seven privacy worries in ubiquitous social computing. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 171-172. http://cups.cs.cmu.edu/soups/2007/posters/p171_motahari.pdf

p. 173-174

Heckle, Rosa R. and Lutters, Wayne G. (2007): Privacy implications for single sign-on authentication in a hospital environment. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 173-174. http://cups.cs.cmu.edu/soups/2007/posters/p173_heckle.pdf

p. 20-28

Dirik, Ahmet Emir, Memon, Nasir and Birget, Jean-Camille (2007): Modeling user choice in the PassPoints graphical password scheme. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 20-28. http://cups.cs.cmu.edu/soups/2007/proceedings/p20_dirik.pdf

p. 29-40

Jensen, Carlos, Sarkar, Chandan, Jensen, Christian and Potts, Colin (2007): Tracking website data-collection and privacy practices with the iWatch web crawler. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 29-40. http://cups.cs.cmu.edu/soups/2007/slides/jensen.pdf Slides

p. 41-51

Clark, Jeremy, Oorschot, P. C. van and Adams, Carlisle (2007): Usability of anonymous web browsing: an examination of Tor interfaces and deployability. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 41-51. http://cups.cs.cmu.edu/soups/2007/proceedings/p41_clark.pdf

p. 52-63

Krishnamurthy, Balachander, Malandrino, Delfina and Wills, Craig E. (2007): Measuring privacy loss and the impact of privacy protection in web browsing. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 52-63. http://cups.cs.cmu.edu/soups/2007/proceedings/p52_krishnamurthy.pdf

p. 64-75

Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K. and Vaniea, Kami (2007): Lessons learned from the deployment of a smartphone-based access-control system. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 64-75. http://cups.cs.cmu.edu/soups/2007/proceedings/p64_bauer.pdf

p. 76-87

Brustoloni, Jos Carlos and Villamarn-Salomn, Ricardo (2007): Improving security decisions with polymorphic and audited dialogs. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 76-87. http://cups.cs.cmu.edu/soups/2007/slides/brustoloni.ppt Slides

p. 88-99

Sheng, Steve, Magnien, Bryant, Kumaraguru, Ponnurangam, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason and Nunge, Elizabeth (2007): Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 88-99. http://cups.cs.cmu.edu/soups/2007/proceedings/p88_sheng.pdf


 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 

User-contributed notes

Give us your opinion! Do you have any comments/additions
that you would like other visitors to see?

 
comment You (your email) say: Sep 3rd, 2015
#1
Sep 3
Add a thoughtful commentary or note to this page ! 
 

will be spam-protected
How many?
= e.g. "6"
User ExperienceBy submitting you agree to the Site Terms
 
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/conferences/proceedings_of_the_2007_symposium_on_usable_privacy_and_security.html