| 2007 | A second look at the usability of click-based graphical passwords. Sonia Chiasson, Robert Biddle, Paul C. van Oorschot |
| 2007 | A survey of privacy concerns with dynamic collaborator discovery capabilities. Robert L. Marchant |
| 2007 | A usability evaluation of a home monitoring system. Rajah James, Woo Tae Kim, Aleecia M. McDonald, Robert McGuire |
| 2007 | An honest man has nothing to fear: user perceptions on web-based information disclosure. Gregory J. Conti, Edward Sobiesk |
| 2007 | Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge |
| 2007 | Bitfrost: the one laptop per child security model. Ivan Krstic, Simson L. Garfinkel |
| 2007 | Defeat spyware with anti-screen capture technology using visual persistence. Johnny Lim |
| 2007 | Detecting, analyzing and responding to security incidents: a qualitative analysis. Rodrigo Werlinger, David Botta, Konstantin Beznosov |
| 2007 | End user concern about security and privacy threats. Joshua B. Gross, Mary Beth Rosson |
| 2007 | Establishing darknet connections: an evaluation of usability and security. John Bethencourt, Wai Yong Low, Isaac Simmons, Matthew Williamson |
| 2007 | Examining privacy and disclosure in a social networking community. Katherine Strater, Heather Richter |
| 2007 | Facemail: showing faces of recipients to prevent misdirected email. Eric Lieberman, Robert C. Miller |
| 2007 | Graphical passwords & qualitative spatial relations. Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan |
| 2007 | Helping users create better passwords: is this the right approach? Alain Forget, Sonia Chiasson, Robert Biddle |
| 2007 | Improving security decisions with polymorphic and audited dialogs. José Carlos Brustoloni, Ricardo Villamarín-Salomón |
| 2007 | Is FacePIN secure and usable? Paul Dunphy, Jeff Yan |
| 2007 | Lessons learned from the deployment of a smartphone-based access-control system. Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea |
| 2007 | Measuring privacy loss and the impact of privacy protection in web browsing. Balachander Krishnamurthy, Delfina Malandrino, Craig E. Wills |
| 2007 | Modeling user choice in the PassPoints graphical password scheme. Ahmet Emir Dirik, Nasir D. Memon, Jean-Camille Birget |
| 2007 | Perception and acceptance of fingerprint biometric technology. Rosa R. Heckle, Andrew S. Patrick, A. Ant Ozok |
| 2007 | Privacy implications for single sign-on authentication in a hospital environment. Rosa R. Heckle, Wayne G. Lutters |
| 2007 | Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007 Lorrie Faith Cranor |
| 2007 | Reducing shoulder-surfing by using gaze-based password entry. Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd |
| 2007 | Secure software installation in a mobile environment. Andreas P. Heiner, N. Asokan |
| 2007 | Seven privacy worries in ubiquitous social computing. Sara Motahari, Constantine N. Manikopoulos, Starr Roxanne Hiltz, Quentin Jones |
| 2007 | Towards understanding IT security professionals and their tools. David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney S. Fels, Brian D. Fisher |
| 2007 | Tracking website data-collection and privacy practices with the iWatch web crawler. Carlos Jensen, Chandan Sarkar, Christian Jensen, Colin Potts |
| 2007 | TwoKind authentication: usable authenticators for untrustworthy environments. Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith |
| 2007 | Usability of anonymous web browsing: an examination of Tor interfaces and deployability. Jeremy Clark, Paul C. van Oorschot, Carlisle Adams |
| 2007 | Vidalia: towards a usable Tor GUI. Matthew Edman, Justin Hipple |