| 2014 | Applying Psychometrics to Measure User Comfort when Constructing a Strong Password. S. M. Taiabul Haque, Shannon Scielzo, Matthew K. Wright |
| 2014 | Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google. Emilee J. Rader |
| 2014 | Behavioral Experiments Exploring Victims' Response to Cyber-based Financial Fraud and Identity Theft Scenario Simulations. Heather Rosoff, Jinshu Cui, Richard S. John |
| 2014 | Crowdsourcing Attacks on Biometric Systems. Saurabh Panjwani, Achintya Prakash |
| 2014 | Exploring Internet Security Perceptions and Practices in Urban Ghana. Jay Chen, Michael Paik, Kelly McCabe |
| 2014 | Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It. Cristian Bravo-Lillo, Lorrie Faith Cranor, Saranga Komanduri, Stuart E. Schechter, Manya Sleeper |
| 2014 | It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, Matthew Smith |
| 2014 | Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. Jialiu Lin, Bin Liu, Norman M. Sadeh, Jason I. Hong |
| 2014 | Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences. Rick Wash, Emilee J. Rader, Kami Vaniea, Michelle Rizor |
| 2014 | Parents' and Teens' Perspectives on Privacy In a Technology-Filled World. Lorrie Faith Cranor, Adam L. Durity, Abigail Marsh, Blase Ur |
| 2014 | Privacy Attitudes of Mechanical Turk Workers and the U.S. Public. Ruogu Kang, Stephanie Brown, Laura Dabbish, Sara B. Kiesler |
| 2014 | Privacy Concerns in Online Recommender Systems: Influences of Control and User Data Input. Bo Zhang, Na Wang, Hongxia Jin |
| 2014 | Tenth Symposium on Usable Privacy and Security, SOUPS 2014, Menlo Park, CA, USA, July 9-11, 2014 Lorrie Faith Cranor, Lujo Bauer, Robert Biddle |
| 2014 | The Effect of Social Influence on Security Sensitivity. Sauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, Jason I. Hong |
| 2014 | The Password Life Cycle: User Behaviour in Managing Passwords. Elizabeth Stobert, Robert Biddle |
| 2014 | To Authorize or Not Authorize: Helping Users Review Access Policies in Organizations. Pooya Jaferian, Hootan Rashtian, Konstantin Beznosov |
| 2014 | To Befriend Or Not? A Model of Friend Request Acceptance on Facebook. Hootan Rashtian, Yazan Boshmaf, Pooya Jaferian, Konstantin Beznosov |
| 2014 | Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation. Stefan Korff, Rainer Böhme |
| 2014 | Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones. Hui Xu, Yangfan Zhou, Michael R. Lyu |
| 2014 | Understanding and Specifying Social Access Control Lists. Mainack Mondal, Yabing Liu, Bimal Viswanath, Krishna P. Gummadi, Alan Mislove |
| 2014 | Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences. Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Lauren Schmidt, Laura Brandimarte, Alessandro Acquisti |
| 2014 | Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning. Hazim Almuhimedi, Adrienne Porter Felt, Robert W. Reeder, Sunny Consolvo |