


default search action
11th SOUPS 2015: Ottawa, Canada
- Lorrie Faith Cranor, Robert Biddle, Sunny Consolvo:

Eleventh Symposium On Usable Privacy and Security, SOUPS 2015, Ottawa, Canada, July 22-24, 2015. USENIX Association 2015, ISBN 978-1-931971-249
Privacy Attitudes and Comprehension
- Florian Schaub, Rebecca Balebako, Adam L. Durity, Lorrie Faith Cranor:

A Design Space for Effective Privacy Notices. 1-17 - Julio Angulo, Martin Ortlieb:

"WTH..!?!" Experiences, Reactions, and Expectations Related to Online Privacy Panic Situations. 19-38 - Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, Sara B. Kiesler:

"My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security. 39-52 - Farah Chanchary, Sonia Chiasson:

User Perceptions of Sharing, Advertising, and Tracking. 53-67
Design and Compliance
- Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg:

Leading Johnny to Water: Designing for Usability and Trust. 69-88 - Sarah J. Andrabi, Michael K. Reiter, Cynthia Sturton:

Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices. 89-102 - John M. Blythe, Lynne M. Coventry, Linda Little:

Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors. 103-122
Authentication Experience
- Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:

"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab. 123-140 - Paul Dunphy, Vasilis Vlachokyriakos, Anja Thieme, James Nicholson, John C. McCarthy, Patrick Olivier:

Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets. 141-150 - Bryan Dosono, Jordan Hayes, Yang Wang:

"I'm Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication. 151-168
Authentication Methods
- Alina Hang, Alexander De Luca, Matthew Smith, Michael Richter, Heinrich Hussmann:

Where Have You Been? Using Location-Based Security Questions for Fallback Authentication. 169-183 - Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew K. Wright, Shannon Scielzo:

The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords. 185-196 - Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba

, Masooda N. Bashir, Konstantin Beznosov:
On the Memorability of System-generated PINs: Can Chunking Help? 197-209 - Yusuf Albayram, Mohammad Maifi Hasan Khan:

Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field Study. 211-224
Mobile Privacy and Security
- Hassan Khan, Urs Hengartner, Daniel Vogel:

Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying. 225-239 - Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:

Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps. 241-255 - Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, Konstantin Beznosov:

On the Impact of Touch ID on iPhone Passcodes. 257-276 - Stuart E. Schechter, Joseph Bonneau:

Learning Assigned Secrets for Unlocking Mobile Devices. 277-295
Security Experience
- Deena Alghamdi, Ivan Flechais, Marina Jirotka:

Security Practices for Households Bank Customers in the Kingdom of Saudi Arabia. 297-308 - Rick Wash, Emilee J. Rader:

Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users. 309-325 - Iulia Ion, Rob Reeder, Sunny Consolvo:

"...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices. 327-346 - Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Jacob Case, Xinming Ou, Michael Wesch, John McHugh, S. Raj Rajagopalan:

A Human Capital Model for Mitigating Security Analyst Burnout. 347-359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














