Proceedings of the 2010 Symposium on Usable Privacy and Security

Conference Details

Year: 2010

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

Other Years in Series

Other proceedings in the SOUPS - Symposium on Usable Privacy and Security series

Articles

Publications included in this conference proceedings

Motiee, Sara, Hawkey, Kirstie, Beznosov, Konstantin (2010): Do windows users follow the principle of least privilege?: investigating user account cont. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 1. https://doi.acm.org/10.1145/1837110.1837112
Shay, Richard, Komanduri, Saranga, Kelley, Patrick Gage, Leon, Pedro Giovanni, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2010): Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 2. https://doi.acm.org/10.1145/1837110.1837113
Dunphy, Paul, Heiner, Andreas P., Asokan, N. (2010): A closer look at recognition-based graphical passwords on mobile devices. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 3. https://doi.acm.org/10.1145/1837110.1837114
Panjwani, Saurabh, Cutrell, Edward (2010): Usably secure, low-cost authentication for mobile banking. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 4. https://doi.acm.org/10.1145/1837110.1837116
Kainda, Ronald, Flechais, Ivan, Roscoe, A. W. (2010): Two heads are better than one: security and usability of device associations in group scen. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 5. https://doi.acm.org/10.1145/1837110.1837117
Ion, Iulia, Langheinrich, Marc, Kumaraguru, Ponnurangam, Capkun, Srdjan (2010): Influence of user perception, security needs, and social factors on device pairing method . In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 6. https://doi.acm.org/10.1145/1837110.1837118
Besmer, Andrew, Watson, Jason, Lipford, Heather Richter (2010): The impact of social navigation on privacy policy configuration. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 7. https://doi.acm.org/10.1145/1837110.1837120
Johnson, Maritza, Karat, John, Karat, Clare-Marie, Grueneberg, Keith (2010): Optimizing a policy authoring framework for security and privacy policies. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 8. https://doi.acm.org/10.1145/1837110.1837121
Jones, Simon, O'Neill, Eamonn (2010): Feasibility of structural network clustering for group-based privacy control in social net. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 9. https://doi.acm.org/10.1145/1837110.1837122
Florencio, Dinei, Herley, Cormac (2010): Where do security policies come from?. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 10. https://doi.acm.org/10.1145/1837110.1837124
Wash, Rick (2010): Folk models of home computer security. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 11. https://doi.acm.org/10.1145/1837110.1837125
Ho, Justin T., Dearman, David, Truong, Khai N. (2010): Improving users' security choices on home wireless networks. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 12. https://doi.acm.org/10.1145/1837110.1837126
Kay, Matthew, Terry, Michael (2010): Textured agreements: re-envisioning electronic consent. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 13. https://doi.acm.org/10.1145/1837110.1837127
Jedrzejczyk, Lukasz, Price, Blaine A., Bandara, Arosha K., Nuseibeh, Bashar (2010): On the impact of real-time feedback on users' behaviour in mobile location-sharing applica. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 14. https://doi.acm.org/10.1145/1837110.1837129
Czeskis, Alexei, Dermendjieva, Ivayla, Yapit, Hussein, Borning, Alan, Friedman, Batya, Gill, Brian, Kohno, Tadayoshi (2010): Parenting from the pocket: value tensions and technical directions for secure and private . In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 15. https://doi.acm.org/10.1145/1837110.1837130
Luca, Alexander De, Langheinrich, Marc, Hussmann, Heinrich (2010): Towards understanding ATM security: a field study of real world ATM use. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 16. https://doi.acm.org/10.1145/1837110.1837131
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Join 326,067+ designers who get one powerful email each week. Learn to design a life you love.

Next email in
0
days
19
hrs
50
mins
1
secs

Free forever. No spam. Unsubscribe anytime.