Proceedings of the 2007 Symposium on Usable Privacy and Security
Conference Details
Year: 2007
Publisher:
ACM Press
Description
Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.
Other Years in Series
Other proceedings in the SOUPS - Symposium on Usable Privacy and Security series
Articles
Publications included in this conference proceedings
Chiasson,
Sonia,
Biddle,
Robert,
Oorschot,
P. C. van
(2007):
A second look at the usability of click-based graphical passwords.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 1-12.
https://cups.cs.cmu.edu/soups/2007/proceedings/p1_chiasson.pdf
Botta,
David,
Werlinger,
Rodrigo,
Gagné,
André,
Beznosov,
Konstantin,
Iverson,
Lee,
Fels,
Sidney,
Fisher,
Brian D.
(2007):
Towards understanding IT security professionals and their tools.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 100-111.
https://konstantin.beznosov.net/professional/works/doi/view.php?116
Conti,
Gregory,
Sobiesk,
Edward
(2007):
An honest man has nothing to fear: user perceptions on web-based information disclosure.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 112-121.
https://cups.cs.cmu.edu/soups/2007/proceedings/p112_conti.pdf
Lieberman,
Eric,
Miller,
Robert C.
(2007):
Facemail: showing faces of recipients to prevent misdirected email.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 122-131.
https://www.mit.edu/~rcm/soups07.ppt
Kumar,
Manu,
Garfinkel,
Tal,
Boneh,
Dan,
Winograd,
Terry
(2007):
Reducing shoulder-surfing by using gaze-based password entry.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 13-19.
https://cups.cs.cmu.edu/soups/2007/proceedings/p13_kumar.pdf
Krstiae,
Ivan,
Garfinkel,
Simson L.
(2007):
Bitfrost: the one laptop per child security model.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 132-142.
https://cups.cs.cmu.edu/soups/2007/proceedings/p132_krstic.pdf
James,
Rajah,
Kim,
Woo Tae,
McDonald,
Aleecia M.,
McGuire,
Robert
(2007):
A usability evaluation of a home monitoring system.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 143-144.
https://cups.cs.cmu.edu/soups/2007/posters/p143_james.pdf
Bethencourt,
John,
Low,
Wai Yong,
Simmons,
Isaac,
Williamson,
Matthew
(2007):
Establishing darknet connections: an evaluation of usability and security.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 145-146.
https://cups.cs.cmu.edu/soups/2007/posters/p145_bethencourt.pdf
Lim,
Johnny
(2007):
Defeat spyware with anti-screen capture technology using visual persistence.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 147-148.
https://cups.cs.cmu.edu/soups/2007/posters/p147_lim.pdf
Werlinger,
Rodrigo,
Botta,
David,
Beznosov,
Konstantin
(2007):
Detecting, analyzing and responding to security incidents: a qualitative analysis.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 149-150.
https://cups.cs.cmu.edu/soups/2007/posters/p149_werlinger.pdf
Forget,
Alain,
Chiasson,
Sonia,
Biddle,
Robert
(2007):
Helping users create better passwords: is this the right approach?.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 151-152.
https://cups.cs.cmu.edu/soups/2007/posters/p151_forget.pdf
Heckle,
Rosa R.,
Patrick,
Andrew S.,
Ozok,
A. Ant
(2007):
Perception and acceptance of fingerprint biometric technology.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 153-154.
https://cups.cs.cmu.edu/soups/2007/posters/p153_heckle.pdf
Heiner,
Andreas P.,
Asokan,
N.
(2007):
Secure software installation in a mobile environment.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 155-156.
https://cups.cs.cmu.edu/soups/2007/posters/p155_heiner.pdf
Strater,
Katherine,
Richter,
Heather
(2007):
Examining privacy and disclosure in a social networking community.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 157-158.
https://cups.cs.cmu.edu/soups/2007/posters/p157_strater.pdf
Marchant,
Robert L.
(2007):
A survey of privacy concerns with dynamic collaborator discovery capabilities.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 159-160.
https://cups.cs.cmu.edu/soups/2007/posters/p159_marchant.pdf
Lin,
Di,
Dunphy,
Paul,
Olivier,
Patrick,
Yan,
Jeff
(2007):
Graphical passwords & qualitative spatial relations.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 161-162.
https://cups.cs.cmu.edu/soups/2007/posters/p161_lin.pdf
Edman,
Matthew,
Hipple,
Justin
(2007):
Vidalia: towards a usable Tor GUI.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 163-164.
https://cups.cs.cmu.edu/soups/2007/posters/p163_edman.pdf
Dunphy,
Paul,
Yan,
Jeff
(2007):
Is FacePIN secure and usable?.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 165-166.
https://cups.cs.cmu.edu/soups/2007/posters/p165_dunphy.pdf
Gross,
Joshua B.,
Rosson,
Mary Beth
(2007):
End user concern about security and privacy threats.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 167-168.
https://cups.cs.cmu.edu/soups/2007/posters/p167_gross.pdf
Bailey,
Katelin,
Vongsathorn,
Linden,
Kapadia,
Apu,
Masone,
Chris,
Smith,
Sean W.
(2007):
TwoKind authentication: usable authenticators for untrustworthy environments.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 169-170.
https://cups.cs.cmu.edu/soups/2007/posters/p169_bailey.pdf
Motahari,
Sara,
Manikopoulos,
Constantine,
Hiltz,
Roxanne,
Jones,
Quentin
(2007):
Seven privacy worries in ubiquitous social computing.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 171-172.
https://cups.cs.cmu.edu/soups/2007/posters/p171_motahari.pdf
Heckle,
Rosa R.,
Lutters,
Wayne G.
(2007):
Privacy implications for single sign-on authentication in a hospital environment.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 173-174.
https://cups.cs.cmu.edu/soups/2007/posters/p173_heckle.pdf
Dirik,
Ahmet Emir,
Memon,
Nasir,
Birget,
Jean-Camille
(2007):
Modeling user choice in the PassPoints graphical password scheme.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 20-28.
https://cups.cs.cmu.edu/soups/2007/proceedings/p20_dirik.pdf
Jensen,
Carlos,
Sarkar,
Chandan,
Jensen,
Christian,
Potts,
Colin
(2007):
Tracking website data-collection and privacy practices with the iWatch web crawler.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 29-40.
https://cups.cs.cmu.edu/soups/2007/slides/jensen.pdf Slides
Clark,
Jeremy,
Oorschot,
P. C. van,
Adams,
Carlisle
(2007):
Usability of anonymous web browsing: an examination of Tor interfaces and deployability.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 41-51.
https://cups.cs.cmu.edu/soups/2007/proceedings/p41_clark.pdf
Krishnamurthy,
Balachander,
Malandrino,
Delfina,
Wills,
Craig E.
(2007):
Measuring privacy loss and the impact of privacy protection in web browsing.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 52-63.
https://cups.cs.cmu.edu/soups/2007/proceedings/p52_krishnamurthy.pdf
Bauer,
Lujo,
Cranor,
Lorrie Faith,
Reiter,
Michael K.,
Vaniea,
Kami
(2007):
Lessons learned from the deployment of a smartphone-based access-control system.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 64-75.
https://cups.cs.cmu.edu/soups/2007/proceedings/p64_bauer.pdf
Brustoloni,
José Carlos,
Villamarín-Salomón,
Ricardo
(2007):
Improving security decisions with polymorphic and audited dialogs.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 76-87.
https://cups.cs.cmu.edu/soups/2007/slides/brustoloni.ppt Slides
Sheng,
Steve,
Magnien,
Bryant,
Kumaraguru,
Ponnurangam,
Acquisti,
Alessandro,
Cranor,
Lorrie Faith,
Hong,
Jason,
Nunge,
Elizabeth
(2007):
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall fo.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 88-99.
https://cups.cs.cmu.edu/soups/2007/proceedings/p88_sheng.pdf