Proceedings of the 2010 Symposium on Usable Privacy and Security

Website
Year
2010
Period
Place
ISBN
Series
SOUPS - Symposium on Usable Privacy and Security
DOI
Volume
Copyright info

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

All years

Articles

Motiee, Sara, Hawkey, Kirstie, Beznosov, Konstantin (2010): Do windows users follow the principle of least privilege?: investigating user account cont. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 1. https://doi.acm.org/10.1145/1837110.1837112

Shay, Richard, Komanduri, Saranga, Kelley, Patrick Gage, Leon, Pedro Giovanni, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2010): Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 2. https://doi.acm.org/10.1145/1837110.1837113

Dunphy, Paul, Heiner, Andreas P., Asokan, N. (2010): A closer look at recognition-based graphical passwords on mobile devices. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 3. https://doi.acm.org/10.1145/1837110.1837114

Panjwani, Saurabh, Cutrell, Edward (2010): Usably secure, low-cost authentication for mobile banking. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 4. https://doi.acm.org/10.1145/1837110.1837116

Kainda, Ronald, Flechais, Ivan, Roscoe, A. W. (2010): Two heads are better than one: security and usability of device associations in group scen. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 5. https://doi.acm.org/10.1145/1837110.1837117

Ion, Iulia, Langheinrich, Marc, Kumaraguru, Ponnurangam, Capkun, Srdjan (2010): Influence of user perception, security needs, and social factors on device pairing method . In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 6. https://doi.acm.org/10.1145/1837110.1837118

Besmer, Andrew, Watson, Jason, Lipford, Heather Richter (2010): The impact of social navigation on privacy policy configuration. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 7. https://doi.acm.org/10.1145/1837110.1837120

Johnson, Maritza, Karat, John, Karat, Clare-Marie, Grueneberg, Keith (2010): Optimizing a policy authoring framework for security and privacy policies. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 8. https://doi.acm.org/10.1145/1837110.1837121

Jones, Simon, O'Neill, Eamonn (2010): Feasibility of structural network clustering for group-based privacy control in social net. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 9. https://doi.acm.org/10.1145/1837110.1837122

Florencio, Dinei, Herley, Cormac (2010): Where do security policies come from?. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 10. https://doi.acm.org/10.1145/1837110.1837124

Wash, Rick (2010): Folk models of home computer security. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 11. https://doi.acm.org/10.1145/1837110.1837125

Ho, Justin T., Dearman, David, Truong, Khai N. (2010): Improving users' security choices on home wireless networks. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 12. https://doi.acm.org/10.1145/1837110.1837126

Kay, Matthew, Terry, Michael (2010): Textured agreements: re-envisioning electronic consent. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 13. https://doi.acm.org/10.1145/1837110.1837127

Jedrzejczyk, Lukasz, Price, Blaine A., Bandara, Arosha K., Nuseibeh, Bashar (2010): On the impact of real-time feedback on users' behaviour in mobile location-sharing applica. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 14. https://doi.acm.org/10.1145/1837110.1837129

Czeskis, Alexei, Dermendjieva, Ivayla, Yapit, Hussein, Borning, Alan, Friedman, Batya, Gill, Brian, Kohno, Tadayoshi (2010): Parenting from the pocket: value tensions and technical directions for secure and private . In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 15. https://doi.acm.org/10.1145/1837110.1837130

Luca, Alexander De, Langheinrich, Marc, Hussmann, Heinrich (2010): Towards understanding ATM security: a field study of real world ATM use. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 16. https://doi.acm.org/10.1145/1837110.1837131

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,279 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,279 designers enjoy our newsletter—sure you don’t want to receive it?