


default search action
20th SOUPS @ USENIX Security Symposium 2024: Philadelphia, PA, USA
- Patrick Gage Kelley, Apu Kapadia:

Twentieth Symposium on Usable Privacy and Security, SOUPS 2024, Philadelphia, PA, USA, August 11-13, 2024. USENIX Association 2024
Expert Community
- Samantha Katcher, Liana Wang, Caroline Yang, Chloé Messdaghi, Michelle L. Mazurek, Marshini Chetty, Kelsey R. Fulton, Daniel Votipka:

A Survey of Cybersecurity Professionals' Perceptions and Experiences of Safety and Belonging in the Community. 1-20 - Ivoline C. Ngong, Brad Stenger, Joseph P. Near, Yuanyuan Feng:

Evaluating the Usability of Differential Privacy Tools with Data Practitioners. 21-40 - Neele Roch, Hannah Sievers, Lorin Schöni, Verena Zimmermann:

Navigating Autonomy: Unveiling Security Experts' Perspectives on Augmented Intelligence in Cybersecurity. 41-60 - Miuyin Yong Wong, Matthew Landen, Frank Li, Fabian Monrose, Mustaque Ahamad:

Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts. 61-80 - Kelsey R. Fulton, Joseph Lewis, Nathan Malkin, Michelle L. Mazurek:

Write, Read, or Fix? Exploring Alternative Methods for Secure Development Studies. 81-100 - Maxwell Prybylo, Sara Haghighi, Sai Teja Peddinti, Sepideh Ghanavati:

Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams. 101-120
IoT and Privacy
- Maximiliane Windl, Jan Leusmann, Albrecht Schmidt, Sebastian S. Feger, Sven Mayer:

Privacy Communication Patterns for Domestic Robots. 121-138 - Shikun Zhang, Lily Klucinec, Kyerra Norton, Norman Sadeh, Lorrie Faith Cranor:

Exploring Expandable-Grid Designs to Make iOS App Privacy Labels More Usable. 139-157 - Geetika Gopi, Aadyaa Maddi, Omkhar Arasaratnam, Giulia Fanti:

Privacy Requirements and Realities of Digital Public Goods. 159-177 - Sunyup Park, Weijia He, Elmira Deldari, Pardis Emami Naeini, Danny Yuxing Huang, Jessica Vitak, Yaxing Yao, Michael Zimmer:

Well-intended but half-hearted: Hosts' consideration of guests' privacy using smart devices on rental properties. 179-198
Authentication and Authorization
- Maike M. Raphael, Aikaterini Kanta, Rico Seebonn, Markus Dürmuth, Camille Cobb:

Batman Hacked My Password: A Subtitle-Based Analysis of Password Depiction in Movies. 199-218 - Phoebe Moh, Andrew Yang, Nathan Malkin, Michelle L. Mazurek:

Understanding How People Share Passwords. 219-237 - Thomas Baumer, Tobias Reittinger, Sascha Kern, Günther Pernul:

Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations. 239-258 - Maximilian Häring, Julia Angelika Grohs, Eva Tiefenau, Matthew Smith, Christian Tiefenau:

Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario. 259-278
Online Community
- Noel Warford, Nicholas Farber, Michelle L. Mazurek:

How Entertainment Journalists Manage Online Hate and Harassment. 279-295 - Madiha Tabassum, Alana Mackey, Ada Lerner:

'Custodian of Online Communities': How Moderator Mutual Support in Communities Help Fight Hate and Harassment Online. 297-314 - Yanlai Wu, Xinning Gui, Yuhan Luo, Yao Li:

Designing the Informing Process with Streamers and Bystanders in Live Streaming. 315-332 - Elijah Robert Bouma-Sims, Hiba Hassan, Alexandra Nisenoff, Lorrie Faith Cranor, Nicolas Christin:

"It was honestly just gambling": Investigating the Experiences of Teenage Cryptocurrency Users on Reddit. 333-352 - Carson Powers, Nickolas Gravel, Christopher Pellegrini, Micah Sherr, Michelle L. Mazurek, Daniel Votipka:

"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts. 353-372 - Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, Elissa M. Redmiles:

"Violation of my body: " Perceptions of AI-generated non-consensual (intimate) imagery. 373-392
Mobile Security
- Sarah Tabassum, Cori Faklaris, Heather Richter Lipford:

What Drives SMiShing Susceptibility? A U.S. Interview Study of How and Why Mobile Phone Users Judge Text Messages to be Real or Fake. 393-411 - David G. Balash, Mir Masood Ali, Chris Kanich, Adam J. Aviv:

"I would not install an app with this label": Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps. 413-432 - Chris Geeng, Natalie Chen, Kieron Ivy Turk, Jevan A. Hutson, Damon McCoy:

"Say I'm in public...I don't want my nudes to pop up." User Threat Models for Using Vault Applications. 433-451 - Sarah Prange, Pascal Knierim, Gabriel Knoll, Felix Dietz, Alexander De Luca, Florian Alt:

"I do (not) need that Feature!" - Understanding Users' Awareness and Control of Privacy Permissions on Android Smartphones. 453-472
Security in the Workplace
- Stef Verreydt, Koen Yskout, Laurens Sion, Wouter Joosen:

Threat modeling state of practice in Dutch organizations. 473-486 - Xiaowei Chen, Sophie Doublet, Anastasia Sergeeva, Gabriele Lenzini, Vincent Koenig, Verena Distler:

What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory. 487-506 - Sarah A. Alromaih, Ivan Flechais, George Chalhoub:

Beyond the Office Walls: Understanding Security and Shadow Security Behaviours in a Remote Work Context. 507-525 - Jan-Philip van Acken, Floris Jansen, Slinger Jansen, Katsiaryna Labunets:

Who is the IT Department Anyway: An Evaluative Case Study of Shadow IT Mindsets Among Corporate Employees. 527-545
Social Aspects of Security
- Nina Gerber, Alina Stöver, Peter Mayer:

Of Mothers and Managers - The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field. 547-566 - Julie M. Haney, Clyburn Cunningham IV, Susanne M. Furman:

Towards Bridging the Research-Practice Gap: Understanding Researcher-Practitioner Interactions and Challenges in Human-Centered Cybersecurity. 567-586 - Joy McLeod, Leah Zhang-Kennedy, Elizabeth Stobert:

Comparing Teacher and Creator Perspectives on the Design of Cybersecurity and Privacy Educational Resources. 587-603 - Lachlan Moore, Tatsuya Mori, Ayako Akiyama Hasegawa:

Negative Effects of Social Triggers on User Security and Privacy Behaviors. 605-622 - Alexandra von Preuschen, Monika C. Schuhmacher, Verena Zimmermann:

Beyond Fear and Frustration - Towards a Holistic Understanding of Emotions in Cybersecurity. 623-642

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














