Proceedings of the 2006 Symposium on Usable Privacy and Security

Publisher
ACM Press
Website
Year
2006
Period
Place
ISBN
Series
SOUPS - Symposium on Usable Privacy and Security
DOI
Volume
Copyright info

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

All years

Articles

DeWitt, Alexander J., Kuljis, Jasna (2006): Aligning usability and security: a usability study of Polaris. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 1-7. https://cups.cs.cmu.edu/soups/2006/proceedings/p1-dewitt.pdf

Wu, Min, Miller, Robert C., Little, Greg (2006): Web wallet: preventing phishing attacks by revealing user intentions. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 102-113. https://cups.cs.cmu.edu/soups/2006/proceedings/p102_wu.pdf

Karger, Paul A. (2006): Privacy and security threat analysis of the federal employee personal identity verificatio. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 114-121. https://cups.cs.cmu.edu/soups/2006/slides/karger.pdf Slides

Newman, Richard, Gavette, Sherman, Yonge, Larry, Anderson, Ross (2006): Protecting domestic power-line communications. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 122-132. https://cups.cs.cmu.edu/soups/2006/proceedings/p122_newman.pdf

Gideon, Julia, Cranor, Lorrie, Egelman, Serge, Acquisti, Alessandro (2006): Power strips, prophylactics, and privacy, oh my!. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 133-144. https://cups.cs.cmu.edu/soups/2006/slides/egelman.ppt Slides

Rode, Jennifer Ann, Johansson, Carolina, DiGioia, Paul, Filho, Roberto Silva, Nies, Kari, Nguyen, David H., Ren, Jie, Dourish, Paul, Redmiles, David F. (2006): Seeing further: extending visualization as a basis for usable security. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 145-155. https://cups.cs.cmu.edu/soups/2006/slides/rode.pdf

Cao, Xiang, Iverson, Lee (2006): Intentional access management: making access control usable for end-users. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 20-31. https://cups.cs.cmu.edu/soups/2006/proceedings/p20_cao.pdf

Yee, Ka-Ping, Sitaker, Kragen (2006): Passpet: convenient password management and phishing protection. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 32-43. https://cups.cs.cmu.edu/soups/2006/slides/yee.pdf Slides

Gaw, Shirley, Felten, Edward (2006): Password management strategies for online accounts. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 44-55. https://cups.cs.cmu.edu/soups/2006/slides/gaw.ppt Slides

Tari, Furkan, Ozok, A. Ant, Holden, Stephen H. (2006): A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphic. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 56-66. https://cups.cs.cmu.edu/soups/2006/proceedings/p56_tari.pdf

Kuo, Cynthia, Romanosky, Sasha, Cranor, Lorrie Faith (2006): Human selection of mnemonic phrase-based passwords. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 67-78. https://cups.cs.cmu.edu/soups/2006/slides/kuo.zip Slides

Downs, Julie S., Holbrook, Mandy B., Cranor, Lorrie Faith (2006): Decision strategies and susceptibility to phishing. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 79-90. https://cups.cs.cmu.edu/soups/2006/proceedings/p79_downs.pdf

Brodie, Carolyn A., Karat, Clare-Marie, Karat, John (2006): An empirical study of natural language parsing of privacy policy rules using the SPARCLE p. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 8-19. https://cups.cs.cmu.edu/soups/2006/proceedings/p8_brodie.pdf

Fu, Anthony Y., Deng, Xiaotie, Wenyin, Liu, Little, Greg (2006): The methodology and an application to fight against Unicode attacks. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 91-101. https://cups.cs.cmu.edu/soups/2006/proceedings/p91_fu.pdf

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,569 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,569 designers enjoy our newsletter—sure you don’t want to receive it?