| 2010 | A closer look at recognition-based graphical passwords on mobile devices. Paul Dunphy, Andreas P. Heiner, N. Asokan |
| 2010 | Do windows users follow the principle of least privilege?: investigating user account control practices. Sara Motiee, Kirstie Hawkey, Konstantin Beznosov |
| 2010 | Encountering stronger password requirements: user attitudes and behaviors. Richard Shay, Saranga Komanduri, Patrick Gage Kelley, Pedro Giovanni Leon, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
| 2010 | Feasibility of structural network clustering for group-based privacy control in social networks. Simon L. Jones, Eamonn O'Neill |
| 2010 | Folk models of home computer security. Rick Wash |
| 2010 | Improving users' security choices on home wireless networks. Justin T. Ho, David Dearman, Khai N. Truong |
| 2010 | Influence of user perception, security needs, and social factors on device pairing method choices. Iulia Ion, Marc Langheinrich, Ponnurangam Kumaraguru, Srdjan Capkun |
| 2010 | On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Bandara, Bashar Nuseibeh |
| 2010 | Optimizing a policy authoring framework for security and privacy policies. Maritza Johnson, John Karat, Clare-Marie Karat, Keith Grueneberg |
| 2010 | Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno |
| 2010 | Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010 Lorrie Faith Cranor |
| 2010 | Textured agreements: re-envisioning electronic consent. Matthew Kay, Michael A. Terry |
| 2010 | The impact of social navigation on privacy policy configuration. Andrew Besmer, Jason Watson, Heather Richter Lipford |
| 2010 | Towards understanding ATM security: a field study of real world ATM use. Alexander De Luca, Marc Langheinrich, Heinrich Hussmann |
| 2010 | Two heads are better than one: security and usability of device associations in group scenarios. Ronald Kainda, Ivan Flechais, A. W. Roscoe |
| 2010 | Usably secure, low-cost authentication for mobile banking. Saurabh Panjwani, Edward Cutrell |
| 2010 | Where do security policies come from? Dinei A. F. Florêncio, Cormac Herley |