Proceedings of the 2009 Symposium on Usable Privacy and Security

Conference Details

Year: 2009
Publisher: ACM Press

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

Other Years in Series

Other proceedings in the SOUPS - Symposium on Usable Privacy and Security series

Articles

Publications included in this conference proceedings

Raja, Fahimeh, Hawkey, Kirstie, Beznosov, Konstantin (2009): Revealing hidden context: improving mental models of personal firewall users. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 1. https://doi.acm.org/10.1145/1572532.1572534
Besmer, Andrew, Lipford, Heather Richter, Shehab, Mohamed, Cheek, Gorrell (2009): Social applications: exploring a more secure framework. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 2. https://doi.acm.org/10.1145/1572532.1572535
Kumaraguru, Ponnurangam, Cranshaw, Justin, Acquisti, Alessandro, Cranor, Lorrie, Hong, Jason, Blair, Mary Ann, Pham, Theodore (2009): School of phish: a real-word evaluation of anti-phishing training. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 3. https://doi.acm.org/10.1145/1572532.1572536
Kelley, Patrick Gage, Bresee, Joanna, Cranor, Lorrie Faith, Reeder, Robert W. (2009): A \"nutrition label\" for privacy. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 4. https://doi.acm.org/10.1145/1572532.1572538
Goecks, Jeremy, Edwards, W. Keith, Mynatt, Elizabeth D. (2009): Challenges in supporting end-user privacy and security management with social navigation. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 5. https://doi.acm.org/10.1145/1572532.1572539
Little, Linda, Sillence, Elizabeth, Briggs, Pam (2009): Ubiquitous systems and the family: thoughts about the networked home. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 6. https://doi.acm.org/10.1145/1572532.1572540
Luca, Alexander De, Denzel, Martin, Hussmann, Heinrich (2009): Look into my eyes!: can you guess my password?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 7. https://doi.acm.org/10.1145/1572532.1572542
Just, Mike, Aspinall, David (2009): Personal choice and challenge questions: a security and usability assessment. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 8. https://doi.acm.org/10.1145/1572532.1572543
Schechter, Stuart, Reeder, Robert W. (2009): 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentic. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 9. https://doi.acm.org/10.1145/1572532.1572544
Kobsa, Alfred, Sonawalla, Rahim, Tsudik, Gene, Uzun, Ersin, Wang, Yang (2009): Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 10. https://doi.acm.org/10.1145/1572532.1572546
Kainda, Ronald, Flechais, Ivan, Roscoe, A. W. (2009): Usability and security of out-of-band channels in secure device pairing protocols. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 11. https://doi.acm.org/10.1145/1572532.1572547
Halprin, Ran, Naor, Moni (2009): Games for extracting randomness. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 12. https://doi.acm.org/10.1145/1572532.1572548
Chow, Richard, Oberst, Ian, Staddon, Jessica (2009): Sanitization\'s slippery slope: the design and study of a text revision assistant. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 13. https://doi.acm.org/10.1145/1572532.1572550
Kluever, Kurt Alfred, Zanibbi, Richard (2009): Balancing usability and security in a video CAPTCHA. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 14. https://doi.acm.org/10.1145/1572532.1572551
Smetters, D. K., Good, Nathan (2009): How users use access control. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 15. https://doi.acm.org/10.1145/1572532.1572552
Sasse, M. Angela, Karat, Clare-Marie, Maxion, Roy (2009): Designing and evaluating usable security and privacy technology. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 16. https://doi.acm.org/10.1145/1572532.1572554
Peeters, Roel, Kohlweiss, Markulf, Preneel, Bart, Sulmon, Nicky (2009): Threshold things that think: usable authorization for resharing. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 18. https://doi.acm.org/10.1145/1572532.1572557
Karp, Alan, Stiegler, Marc, Close, Tyler (2009): Not one click for security?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 19. https://doi.acm.org/10.1145/1572532.1572558
Church, Luke, Anderson, Jonathan, Bonneau, Joesph, Stajano, Frank (2009): Privacy stories: confidence in privacy behaviors through end user programming. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 20. https://doi.acm.org/10.1145/1572532.1572559
Gao, Haichang, Liu, Xiyang (2009): A new graphical password scheme against spyware by using CAPTCHA. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 21. https://doi.acm.org/10.1145/1572532.1572560
Benisch, Michael, Kelley, Patrick Gage, Sadeh, Norman, Sandholm, Tuomas, Tsai, Janice, Cranor, Lorrie Faith, Drielsma, Paul Hankes (2009): The impact of expressiveness on the effectiveness of privacy mechanisms for location-shari. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 22. https://doi.acm.org/10.1145/1572532.1572561
Motahari, Sara, Ziavras, Sotirios, Jones, Quentin (2009): Designing for different levels of social inference risk. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 23. https://doi.acm.org/10.1145/1572532.1572562
Zenebe, Azene, Tuner, Claude, Feng, Jinjuan, Lazar, Jonathan, O\'Leary, Mike (2009): Integrating usability and accessibility in information assurance education. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 24. https://doi.acm.org/10.1145/1572532.1572563
Hayashi, Eiji, Hong, Jason, Christin, Nicolas (2009): Educated guess on graphical authentication schemes: vulnerabilities and countermeasures. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 25. https://doi.acm.org/10.1145/1572532.1572564
Likarish, Peter, Dunbar, Don, Hourcade, Juan Pablo, Jung, Eunjin (2009): BayeShield: conversational anti-phishing user interface. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 26. https://doi.acm.org/10.1145/1572532.1572565
Maetz, Yves, Onno, Stéphane, Heen, Olivier (2009): Recall-a-story, a story-telling graphical password system. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 27. https://doi.acm.org/10.1145/1572532.1572566
Fisler, Kathi, Krishnamurthi, Shriram (2009): Escape from the matrix: lessons from a case-study in access-control requirements. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 28. https://doi.acm.org/10.1145/1572532.1572567
Tsai, Janice, Egelman, Serge, Cranor, Lorrie, Acquisti, Alessandro (2009): The impact of privacy indicators on search engine browsing patterns. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 29. https://doi.acm.org/10.1145/1572532.1572568
Bonneau, Joseph, Anderson, Jonathan, Church, Luke (2009): Privacy suites: shared privacy for social networks. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 30. https://doi.acm.org/10.1145/1572532.1572569
McQuaid, Michael, Zheng, Kai, Melville, Nigel, Green, Lee (2009): Usable deidentification of sensitive patient care data. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 31. https://doi.acm.org/10.1145/1572532.1572570
Toch, Eran, Ravichandran, Ramprasad, Cranor, Lorrie, Drielsma, Paul, Hong, Jason, Kelley, Patrick, Sadeh, Norman, Tsai, Janice (2009): Analyzing use of privacy policy attributes in a location sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 32. https://doi.acm.org/10.1145/1572532.1572571
Thomas, Keerthi, Mancini, Clara, Jedrzejczyk, Lukasz, Bandara, Arosha K., Joinson, Adam, Price, Blaine A., Rogers, Yvonne, Nuseibeh, Bashar (2009): Studying location privacy in mobile applications: \'predator vs. prey\' probes. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 33. https://doi.acm.org/10.1145/1572532.1572572
Saxena, Nitesh, Uddin, Md. Borhan, Voris, Jonathan (2009): Treat \'em like other devices: user authentication of multiple personal RFID tags. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 34. https://doi.acm.org/10.1145/1572532.1572573
Kay, Matthew, Terry, Michael (2009): Textured agreements: re-envisioning electronic consent. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 35. https://doi.acm.org/10.1145/1572532.1572574
Jaferian, Pooya, Botta, David, Hawkey, Kirstie, Beznosov, Konstantin (2009): A multi-method approach for user-centered design of identity management systems. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 36. https://doi.acm.org/10.1145/1572532.1572575
Lucas, Matthew, Borisov, Nikita (2009): flyByNight: mitigating the privacy risks of social networking. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 37. https://doi.acm.org/10.1145/1572532.1572577
Karlof, Chris, Tygar, J. D., Wagner, David (2009): Conditioned-safe ceremonies and a user study of an application to web authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 38. https://doi.acm.org/10.1145/1572532.1572578
Bicakci, Kemal, Yuceel, Mustafa, Erdeniz, Burak, Gurbaslar, Hakan, Atalay, Nart Bedin (2009): Graphical passwords as browser extension: implementation and usability study. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 39. https://doi.acm.org/10.1145/1572532.1572579
Schechter, Stuart, Brush, A. J. Bernheim, Egelman, Serge (2009): It\'s no secret: measuring the security and reliability of authentication via \'secret\' q. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 40. https://doi.acm.org/10.1145/1572532.1572580
Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 41. https://doi.acm.org/10.1145/1572532.1572581
Reeder, Robert W., Kelley, Patrick Gage, McDonald, Aleecia M., Cranor, Lorrie Faith (2009): A user study of the expandable grid applied to P3P privacy policy visualization. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 42. https://doi.acm.org/10.1145/1572532.1572582
Tsai, Janice, Kelley, Patrick, Drielsma, Paul Hankes, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 43. https://doi.acm.org/10.1145/1572532.1572583
Hasegawa, Madoka, Christin, Nicolas, Hayashi, Eiji (2009): New directions in multisensory authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 44. https://doi.acm.org/10.1145/1572532.1572584
Golle, Philippe (2009): Machine learning attacks against the Asirra CAPTCHA. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 45. https://doi.acm.org/10.1145/1572532.1572585
McDonald, Aleecia M., Reeder, Robert W., Kelley, Patrick Gage, Cranor, Lorrie Faith (2009): A comparative study of online privacy policies and formats. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 46. https://doi.acm.org/10.1145/1572532.1572586
Ravichandran, Ramprasad, Benisch, Michael, Kelley, Patrick Gauge, Sadeh, Norman (2009): Capturing social networking privacy preferences: can default policies help alleviate trade. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 47. https://doi.acm.org/10.1145/1572532.1572587
Sachs, Eric (2009): Redirects to login pages are bad, or are they?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 48. https://doi.acm.org/10.1145/1572532.1572589
Gillis, Nancy (2009): Short and long term research suggestions for NSF and NIST. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 49. https://doi.acm.org/10.1145/1572532.1572591
Patrick, Andrew (2009): Ecological validity in studies of security and human behaviour. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 50. https://doi.acm.org/10.1145/1572532.1572592
Garfinkel, Simson (2009): Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and . In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 51. https://doi.acm.org/10.1145/1572532.1572593
Zurko, Mary Ellen (2009): Technology transfer of successful usable security research into product. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 52. https://doi.acm.org/10.1145/1572532.1572594
Little, Linda (2009): The family and communication technologies. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 53. https://doi.acm.org/10.1145/1572532.1572595
Karvonen, Kristiina (2009): How does the emergence of reputation mechanisms affect the overall trust formation mechani. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 54. https://doi.acm.org/10.1145/1572532.1572596
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Join 326,067+ designers who get one powerful email each week. Learn to design a life you love.

Next email in
0
days
19
hrs
50
mins
3
secs

Free forever. No spam. Unsubscribe anytime.