SOUPS 2007: Pittsburgh, PA, USA
Lorrie Faith Cranor (Ed.): Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007. ACM 2007 ACM International Conference Proceeding Series 229 ISBN 978-1-59593-801-5
Passwords
Sonia Chiasson, Robert Biddle, Paul C. van Oorschot: A second look at the usability of click-based graphical passwords. 1-12
Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd: Reducing shoulder-surfing by using gaze-based password entry. 13-19
Ahmet Emir Dirik, Nasir D. Memon, Jean-Camille Birget: Modeling user choice in the PassPoints graphical password scheme. 20-28
Privacy and access control
Carlos Jensen, Chandan Sarkar, Christian Jensen, Colin Potts: Tracking website data-collection and privacy practices with the iWatch web crawler. 29-40
Jeremy Clark, Paul C. van Oorschot, Carlisle Adams: Usability of anonymous web browsing: an examination of Tor interfaces and deployability. 41-51
Balachander Krishnamurthy, Delfina Malandrino, Craig E. Wills: Measuring privacy loss and the impact of privacy protection in web browsing. 52-63
Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea: Lessons learned from the deployment of a smartphone-based access-control system. 64-75
Training and such
José Carlos Brustoloni, Ricardo Villamarín-Salomón: Improving security decisions with polymorphic and audited dialogs. 76-85
Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. 88-99
David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, Brian D. Fisher: Towards understanding IT security professionals and their tools. 100-111
SOUPS du jour
Gregory J. Conti, Edward Sobiesk: An honest man has nothing to fear: user perceptions on web-based information disclosure. 112-121
Eric Lieberman, Robert C. Miller: Facemail: showing faces of recipients to prevent misdirected email. 122-131
Posters
Rajah James, Woo Tae Kim, Aleecia M. McDonald, Robert McGuire: A usability evaluation of a home monitoring system. 143-144
John Bethencourt, Wai Yong Low, Isaac Simmons, Matthew Williamson: Establishing darknet connections: an evaluation of usability and security. 145-146
Johnny Lim: Defeat spyware with anti-screen capture technology using visual persistence. 147-148
Rodrigo Werlinger, David Botta, Konstantin Beznosov: Detecting, analyzing and responding to security incidents: a qualitative analysis. 149-150
Alain Forget, Sonia Chiasson, Robert Biddle: Helping users create better passwords: is this the right approach? 151-152
Rosa R. Heckle, Andrew S. Patrick, A. Ant Ozok: Perception and acceptance of fingerprint biometric technology. 153-154
Katherine Strater, Heather Richter: Examining privacy and disclosure in a social networking community. 157-158
Robert L. Marchant: A survey of privacy concerns with dynamic collaborator discovery capabilities. 159-160
Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan: Graphical passwords & qualitative spatial relations. 161-162


Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith: TwoKind authentication: usable authenticators for untrustworthy environments. 169-170
Sara Motahari, Constantine Manikopoulos, Starr Roxanne Hiltz, Quentin Jones: Seven privacy worries in ubiquitous social computing. 171-172
Rosa R. Heckle, Wayne G. Lutters: Privacy implications for single sign-on authentication in a hospital environment. 173-174



