Proceedings of the 2012 Symposium on Usable Privacy and Security
Conference Details
Year: 2012
Description
Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.
Other Years in Series
Other proceedings in the SOUPS - Symposium on Usable Privacy and Security series
Articles
Publications included in this conference proceedings
Chin,
Erika,
Felt,
Adrienne Porter,
Sekar,
Vyas,
Wagner,
David
(2012):
Measuring user confidence in smartphone security and privacy.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 1.
https://dx.doi.org/10.1145/2335356.2335358
Hayashi,
Eiji,
Riva,
Oriana,
Strauss,
Karin,
Brush,
A. J. Bernheim,
Schechter,
Stuart
(2012):
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's ap.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 2.
https://dx.doi.org/10.1145/2335356.2335359
Felt,
Adrienne Porter,
Ha,
Elizabeth,
Egelman,
Serge,
Haney,
Ariel,
Chin,
Erika,
Wagner,
David
(2012):
Android permissions: user attention, comprehension, and behavior.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 3.
https://dx.doi.org/10.1145/2335356.2335360
Ur,
Blase,
Leon,
Pedro Giovanni,
Cranor,
Lorrie Faith,
Shay,
Richard,
Wang,
Yang
(2012):
Smart, useful, scary, creepy: perceptions of online behavioral advertising.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 4.
https://dx.doi.org/10.1145/2335356.2335362
Patil,
Sameer,
Norcie,
Greg,
Kapadia,
Apu,
Lee,
Adam J.
(2012):
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive pr.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 5.
https://dx.doi.org/10.1145/2335356.2335363
Rader,
Emilee,
Wash,
Rick,
Brooks,
Brandon
(2012):
Stories as informal lessons about security.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 6.
https://dx.doi.org/10.1145/2335356.2335364
Shay,
Richard,
Kelley,
Patrick Gage,
Komanduri,
Saranga,
Mazurek,
Michelle L.,
Ur,
Blase,
Vidas,
Timothy,
Bauer,
Lujo,
Christin,
Nicolas,
Cranor,
Lorrie Faith
(2012):
Correct horse battery staple: exploring the usability of system-assigned passphrases.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 7.
https://dx.doi.org/10.1145/2335356.2335366
Wright,
Nicholas,
Patrick,
Andrew S.,
Biddle,
Robert
(2012):
Do you see your password?: applying recognition to textual passwords.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 8.
https://dx.doi.org/10.1145/2335356.2335367
Johnson,
Maritza,
Egelman,
Serge,
Bellovin,
Steven M.
(2012):
Facebook and privacy: it's complicated.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 9.
https://dx.doi.org/10.1145/2335356.2335369
Staddon,
Jessica,
Huffaker,
David,
Brown,
Larkin,
Sedley,
Aaron
(2012):
Are privacy concerns a turn-off?: engagement and privacy in social networks.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 10.
https://dx.doi.org/10.1145/2335356.2335370
Fahl,
Sascha,
Harbach,
Marian,
Muders,
Thomas,
Smith,
Matthew,
Sander,
Uwe
(2012):
Helping Johnny 2.0 to encrypt his Facebook conversations.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 11.
https://dx.doi.org/10.1145/2335356.2335371
Watson,
Jason,
Besmer,
Andrew,
Lipford,
Heather Richter
(2012):
+Your circles: sharing behavior on Google+.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 12.
https://dx.doi.org/10.1145/2335356.2335373
Mazzia,
Alessandra,
LeFevre,
Kristen,
Adar,
Eytan
(2012):
The PViz comprehension tool for social network privacy settings.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 13.
https://dx.doi.org/10.1145/2335356.2335374
Krishnan,
Vivek,
Tripunitara,
Mahesh V.,
Chik,
Kinson,
Bergstrom,
Tony
(2012):
Relating declarative semantics and usability in access control.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 14.
https://dx.doi.org/10.1145/2335356.2335375