Proceedings of the 2005 Symposium on Usable Privacy and Security

Conference Details

Year: 2005
Publisher: ACM Press

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

Other Years in Series

Other proceedings in the SOUPS - Symposium on Usable Privacy and Security series

Articles

Publications included in this conference proceedings

Wiedenbeck, Susan, Waters, Jim, Birget, Jean-Camille, Brodskiy, Alex, Memon, Nasir (2005): Authentication using graphical passwords: effects of tolerance and image choice. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 1-12. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p1-wiedenbeck.pdf
DiGioia, Paul, Dourish, Paul (2005): Social navigation as a model for usable security. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 101-108. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p101-digioia.pdf
Garfinkel, Simson L., Miller, Robert C. (2005): Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 13-24. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p13-garfinkel.pdf
Paula, Rogerio de, Ding, Xianghua, Dourish, Paul, Nies, Kari, Pillet, Ben, Redmiles, David F., Ren, Jie, Rode, Jennifer Ann, Filho, Roberto Silva (2005): Two experiences designing for effective security. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 25-34. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p25-depaula.pdf
Brodie, Carolyn, Karat, Clare-Marie, Karat, John, Feng, Jinjuan (2005): Usable security and privacy: a case study of developing privacy management tools. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 35-43. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p35-brodie.pdf
Good, Nathaniel, Dhamija, Rachna, Grossklags, Jens, Thaw, David, Aronowitz, Steven, Mulligan, Deirdre, Konstan, Joseph A. (2005): Stopping spyware at the gate: a user study of privacy, notice and spyware. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 43-52. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p43-good.pdf
Iachello, Giovanni, Smith, Ian, Consolvo, Sunny, Chen, Mike, Abowd, Gregory D. (2005): Developing privacy guidelines for social location disclosure applications and services. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 65-76. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p65-iachello.pdf
Dhamija, Rachna, Tygar, J. D. (2005): The battle against phishing: Dynamic Security Skins. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 77-88. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p77-dhamija.pdf
Conti, Gregory, Ahamad, Mustaque, Stasko, John T. (2005): Attacking information visualization system usability overloading and deceiving the human. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 89-100. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p89-conti.pdf
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Join 326,067+ designers who get one powerful email each week. Learn to design a life you love.

Next email in
0
days
19
hrs
50
mins
22
secs

Free forever. No spam. Unsubscribe anytime.