


default search action
14th SOUPS @ USENIX Security Symposium 2018: Baltimore, MD, USA
- Mary Ellen Zurko, Heather Richter Lipford:

Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018. USENIX Association 2018
User Authentication
- Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer:

Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios. 1-11 - Hana Habib, Pardis Emami Naeini, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:

User Behaviors and Attitudes Under Password Expiration Policies. 13-30 - Elham Al Qahtani, Mohamed Shehab, Abrar Aljohani:

The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians. 31-46 - Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent E. Seamons, Daniel Zappala:

Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal. 47-62
Behaviors and Practices
- Norbert Nthala, Ivan Flechais:

Informal Support Networks: an investigation into Home Data Security Practices. 63-82 - Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason I. Hong:

Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships. 83-102 - Arunesh Mathur, Jessica Vitak, Arvind Narayanan, Marshini Chetty:

Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking. 103-116 - Sonam Samat, Eyal Péer, Alessandro Acquisti:

Can Digital Face-Morphs Influence Attitudes and Online Behaviors? 117-125
Online Privacy
- Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, Elizabeth F. Churchill:

"Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia. 127-142 - Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, Norman Makoto Su:

"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography. 143-157 - Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor:

Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing. 159-175 - Reham Ebada Mohamed, Sonia Chiasson:

Online Privacy and Aging of Digital Artifacts. 177-195
Data Exposure, Compromises, and Access
- Yixin Zou, Abraham H. Mhaidli, Austin McCall, Florian Schaub:

"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach. 197-216 - Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, Oxana Comanescu:

Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data. 217-234 - Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Thomas Gilray, Michelle L. Mazurek, Jeffrey S. Foster:

User Comfort with Android Background Resource Accesses in Different Contexts. 235-250 - Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten:

Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens. 251-263
Developers
- Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl:

Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. 265-281 - Hala Assal, Sonia Chiasson:

Security in the Software Development Lifecycle. 281-296 - Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Matthew Smith

:
Deception Task Design in Developer Password Studies: Exploring a Student Sample. 297-313 - Daniela Seabra Oliveira, Tian Lin, Muhammad Sajidur Rahman, Rad Akefirad, Donovan M. Ellis, Eliany Perez, Rahul Bobhate, Lois DeLong, Justin Cappos, Yuriy Brun:

API Blindspots: Why Experienced Developers Write Vulnerable Code. 315-328
Understanding and Mindsets
- Ambar Murillo, Andreas Kramm, Sebastian Schnorf, Alexander De Luca:

"If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration. 329-339 - Norman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix C. Freiling, Zinaida Benenson:

Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently. 341-356 - Julie M. Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman:

"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products. 357-373 - Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent E. Seamons:

A Comparative Usability Study of Key Management in Secure Email. 375-394
Models, Beliefs, and Perceptions
- Justin Wu, Daniel Zappala:

When is a Tree Really a Truck? Exploring Mental Models of Encryption. 395-409 - Julie M. Haney, Wayne G. Lutters:

"It's Scary...It's Confusing...It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security. 411-425 - Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, Elissa M. Redmiles:

Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality. 427-442 - James Nicholson, Lynne M. Coventry, Pam Briggs:

Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection. 443-457

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














