Proceedings of the 2012 Symposium on Usable Privacy and Security

Website
Year
2012
Period
Place
ISBN
Series
SOUPS - Symposium on Usable Privacy and Security
DOI
Volume
Copyright info

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

All years

Articles

Chin, Erika, Felt, Adrienne Porter, Sekar, Vyas, Wagner, David (2012): Measuring user confidence in smartphone security and privacy. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 1. https://dx.doi.org/10.1145/2335356.2335358

Hayashi, Eiji, Riva, Oriana, Strauss, Karin, Brush, A. J. Bernheim, Schechter, Stuart (2012): Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's ap. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 2. https://dx.doi.org/10.1145/2335356.2335359

Felt, Adrienne Porter, Ha, Elizabeth, Egelman, Serge, Haney, Ariel, Chin, Erika, Wagner, David (2012): Android permissions: user attention, comprehension, and behavior. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 3. https://dx.doi.org/10.1145/2335356.2335360

Ur, Blase, Leon, Pedro Giovanni, Cranor, Lorrie Faith, Shay, Richard, Wang, Yang (2012): Smart, useful, scary, creepy: perceptions of online behavioral advertising. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 4. https://dx.doi.org/10.1145/2335356.2335362

Patil, Sameer, Norcie, Greg, Kapadia, Apu, Lee, Adam J. (2012): Reasons, rewards, regrets: privacy considerations in location sharing as an interactive pr. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 5. https://dx.doi.org/10.1145/2335356.2335363

Rader, Emilee, Wash, Rick, Brooks, Brandon (2012): Stories as informal lessons about security. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 6. https://dx.doi.org/10.1145/2335356.2335364

Shay, Richard, Kelley, Patrick Gage, Komanduri, Saranga, Mazurek, Michelle L., Ur, Blase, Vidas, Timothy, Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2012): Correct horse battery staple: exploring the usability of system-assigned passphrases. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 7. https://dx.doi.org/10.1145/2335356.2335366

Wright, Nicholas, Patrick, Andrew S., Biddle, Robert (2012): Do you see your password?: applying recognition to textual passwords. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 8. https://dx.doi.org/10.1145/2335356.2335367

Johnson, Maritza, Egelman, Serge, Bellovin, Steven M. (2012): Facebook and privacy: it's complicated. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 9. https://dx.doi.org/10.1145/2335356.2335369

Staddon, Jessica, Huffaker, David, Brown, Larkin, Sedley, Aaron (2012): Are privacy concerns a turn-off?: engagement and privacy in social networks. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 10. https://dx.doi.org/10.1145/2335356.2335370

Fahl, Sascha, Harbach, Marian, Muders, Thomas, Smith, Matthew, Sander, Uwe (2012): Helping Johnny 2.0 to encrypt his Facebook conversations. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 11. https://dx.doi.org/10.1145/2335356.2335371

Watson, Jason, Besmer, Andrew, Lipford, Heather Richter (2012): +Your circles: sharing behavior on Google+. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 12. https://dx.doi.org/10.1145/2335356.2335373

Mazzia, Alessandra, LeFevre, Kristen, Adar, Eytan (2012): The PViz comprehension tool for social network privacy settings. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 13. https://dx.doi.org/10.1145/2335356.2335374

Krishnan, Vivek, Tripunitara, Mahesh V., Chik, Kinson, Bergstrom, Tony (2012): Relating declarative semantics and usability in access control. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 14. https://dx.doi.org/10.1145/2335356.2335375

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,901 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,901 designers enjoy our newsletter—sure you don’t want to receive it?