Upcoming Courses

go to course
Quality Web Communication: The Beginner's Guide
Starts tomorrow LAST CALL!
go to course
UI Design Patterns for Successful Software
90% booked. Starts in 5 days
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Upcoming Courses

go to course
Quality Web Communication: The Beginner's Guide
Starts tomorrow LAST CALL!
go to course
UI Design Patterns for Successful Software
90% booked. Starts in 5 days
 
 

Proceedings of the 2010 Symposium on Usable Privacy and Security


 
Time and place:

2010
Conf. description:
Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.
Help us!
Do you know when the next conference is? If yes, please add it to the calendar!
Series:
This is a preferred venue for people like Lorrie Faith Cranor, Robert W. Reeder, Jason Hong, Konstantin Beznosov, and Lorrie Cranor. Part of the SOUPS - Symposium on Usable Privacy and Security conference series.
Other years:
EDIT

The following articles are from "Proceedings of the 2010 Symposium on Usable Privacy and Security":

 what's this?

Articles

p. 1

Motiee, Sara, Hawkey, Kirstie and Beznosov, Konstantin (2010): Do windows users follow the principle of least privilege?: investigating user account control practices. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 1. http://doi.acm.org/10.1145/1837110.1837112

p. 10

Florencio, Dinei and Herley, Cormac (2010): Where do security policies come from?. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 10. http://doi.acm.org/10.1145/1837110.1837124

p. 11

Wash, Rick (2010): Folk models of home computer security. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 11. http://doi.acm.org/10.1145/1837110.1837125

p. 12

Ho, Justin T., Dearman, David and Truong, Khai N. (2010): Improving users' security choices on home wireless networks. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 12. http://doi.acm.org/10.1145/1837110.1837126

p. 13

Kay, Matthew and Terry, Michael (2010): Textured agreements: re-envisioning electronic consent. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 13. http://doi.acm.org/10.1145/1837110.1837127

p. 14

Jedrzejczyk, Lukasz, Price, Blaine A., Bandara, Arosha K. and Nuseibeh, Bashar (2010): On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 14. http://doi.acm.org/10.1145/1837110.1837129

p. 15

Czeskis, Alexei, Dermendjieva, Ivayla, Yapit, Hussein, Borning, Alan, Friedman, Batya, Gill, Brian and Kohno, Tadayoshi (2010): Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 15. http://doi.acm.org/10.1145/1837110.1837130

p. 16

Luca, Alexander De, Langheinrich, Marc and Hussmann, Heinrich (2010): Towards understanding ATM security: a field study of real world ATM use. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 16. http://doi.acm.org/10.1145/1837110.1837131

p. 2

Shay, Richard, Komanduri, Saranga, Kelley, Patrick Gage, Leon, Pedro Giovanni, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas and Cranor, Lorrie Faith (2010): Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 2. http://doi.acm.org/10.1145/1837110.1837113

p. 3

Dunphy, Paul, Heiner, Andreas P. and Asokan, N. (2010): A closer look at recognition-based graphical passwords on mobile devices. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 3. http://doi.acm.org/10.1145/1837110.1837114

p. 4

Panjwani, Saurabh and Cutrell, Edward (2010): Usably secure, low-cost authentication for mobile banking. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 4. http://doi.acm.org/10.1145/1837110.1837116

p. 5

Kainda, Ronald, Flechais, Ivan and Roscoe, A. W. (2010): Two heads are better than one: security and usability of device associations in group scenarios. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 5. http://doi.acm.org/10.1145/1837110.1837117

p. 6

Ion, Iulia, Langheinrich, Marc, Kumaraguru, Ponnurangam and Capkun, Srdjan (2010): Influence of user perception, security needs, and social factors on device pairing method choices. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 6. http://doi.acm.org/10.1145/1837110.1837118

p. 7

Besmer, Andrew, Watson, Jason and Lipford, Heather Richter (2010): The impact of social navigation on privacy policy configuration. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 7. http://doi.acm.org/10.1145/1837110.1837120

p. 8

Johnson, Maritza, Karat, John, Karat, Clare-Marie and Grueneberg, Keith (2010): Optimizing a policy authoring framework for security and privacy policies. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 8. http://doi.acm.org/10.1145/1837110.1837121

p. 9

Jones, Simon and O'Neill, Eamonn (2010): Feasibility of structural network clustering for group-based privacy control in social networks. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 9. http://doi.acm.org/10.1145/1837110.1837122


 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 

User-contributed notes

Give us your opinion! Do you have any comments/additions
that you would like other visitors to see?

 
comment You (your email) say: Jul 28th, 2015
#1
Jul 28
Add a thoughtful commentary or note to this page ! 
 

will be spam-protected
How many?
= e.g. "6"
User ExperienceBy submitting you agree to the Site Terms
 
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/conferences/proceedings_of_the_2010_symposium_on_usable_privacy_and_security.html