Proceedings of the 2005 Symposium on Usable Privacy and Security
Conference Details
Year: 2005
Publisher:
ACM Press
Description
Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.
Other Years in Series
Other proceedings in the SOUPS - Symposium on Usable Privacy and Security series
Articles
Publications included in this conference proceedings
Wiedenbeck,
Susan,
Waters,
Jim,
Birget,
Jean-Camille,
Brodskiy,
Alex,
Memon,
Nasir
(2005):
Authentication using graphical passwords: effects of tolerance and image choice.
In:
Proceedings of the 2005 Symposium on Usable Privacy and Security
,
2005,
.
pp. 1-12.
https://cups.cs.cmu.edu/soups/2005/2005proceedings/p1-wiedenbeck.pdf
DiGioia,
Paul,
Dourish,
Paul
(2005):
Social navigation as a model for usable security.
In:
Proceedings of the 2005 Symposium on Usable Privacy and Security
,
2005,
.
pp. 101-108.
https://cups.cs.cmu.edu/soups/2005/2005proceedings/p101-digioia.pdf
Garfinkel,
Simson L.,
Miller,
Robert C.
(2005):
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express.
In:
Proceedings of the 2005 Symposium on Usable Privacy and Security
,
2005,
.
pp. 13-24.
https://cups.cs.cmu.edu/soups/2005/2005proceedings/p13-garfinkel.pdf
Paula,
Rogerio de,
Ding,
Xianghua,
Dourish,
Paul,
Nies,
Kari,
Pillet,
Ben,
Redmiles,
David F.,
Ren,
Jie,
Rode,
Jennifer Ann,
Filho,
Roberto Silva
(2005):
Two experiences designing for effective security.
In:
Proceedings of the 2005 Symposium on Usable Privacy and Security
,
2005,
.
pp. 25-34.
https://cups.cs.cmu.edu/soups/2005/2005proceedings/p25-depaula.pdf
Brodie,
Carolyn,
Karat,
Clare-Marie,
Karat,
John,
Feng,
Jinjuan
(2005):
Usable security and privacy: a case study of developing privacy management tools.
In:
Proceedings of the 2005 Symposium on Usable Privacy and Security
,
2005,
.
pp. 35-43.
https://cups.cs.cmu.edu/soups/2005/2005proceedings/p35-brodie.pdf
Good,
Nathaniel,
Dhamija,
Rachna,
Grossklags,
Jens,
Thaw,
David,
Aronowitz,
Steven,
Mulligan,
Deirdre,
Konstan,
Joseph A.
(2005):
Stopping spyware at the gate: a user study of privacy, notice and spyware.
In:
Proceedings of the 2005 Symposium on Usable Privacy and Security
,
2005,
.
pp. 43-52.
https://cups.cs.cmu.edu/soups/2005/2005proceedings/p43-good.pdf
Pettersson,
John Soren,
Fischer-Hübner,
Simone,
Danielsson,
Ninni,
Nilsson,
Jenny,
Bergmann,
Mike,
Clauss,
Sebastian,
Kriegelstein,
Thomas,
Krasemann,
Henry
(2005):
Making PRIME usable.
In:
Proceedings of the 2005 Symposium on Usable Privacy and Security
,
2005,
.
pp. 53-64.
https://cups.cs.cmu.edu/soups/2005/2005proceedings/p53-pettersson.pdf
Iachello,
Giovanni,
Smith,
Ian,
Consolvo,
Sunny,
Chen,
Mike,
Abowd,
Gregory D.
(2005):
Developing privacy guidelines for social location disclosure applications and services.
In:
Proceedings of the 2005 Symposium on Usable Privacy and Security
,
2005,
.
pp. 65-76.
https://cups.cs.cmu.edu/soups/2005/2005proceedings/p65-iachello.pdf
Dhamija,
Rachna,
Tygar,
J. D.
(2005):
The battle against phishing: Dynamic Security Skins.
In:
Proceedings of the 2005 Symposium on Usable Privacy and Security
,
2005,
.
pp. 77-88.
https://cups.cs.cmu.edu/soups/2005/2005proceedings/p77-dhamija.pdf
Conti,
Gregory,
Ahamad,
Mustaque,
Stasko,
John T.
(2005):
Attacking information visualization system usability overloading and deceiving the human.
In:
Proceedings of the 2005 Symposium on Usable Privacy and Security
,
2005,
.
pp. 89-100.
https://cups.cs.cmu.edu/soups/2005/2005proceedings/p89-conti.pdf