SOUPS A

22 papers

YearTitle / Authors
2014Applying Psychometrics to Measure User Comfort when Constructing a Strong Password.
S. M. Taiabul Haque, Shannon Scielzo, Matthew K. Wright
2014Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google.
Emilee J. Rader
2014Behavioral Experiments Exploring Victims' Response to Cyber-based Financial Fraud and Identity Theft Scenario Simulations.
Heather Rosoff, Jinshu Cui, Richard S. John
2014Crowdsourcing Attacks on Biometric Systems.
Saurabh Panjwani, Achintya Prakash
2014Exploring Internet Security Perceptions and Practices in Urban Ghana.
Jay Chen, Michael Paik, Kelly McCabe
2014Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It.
Cristian Bravo-Lillo, Lorrie Faith Cranor, Saranga Komanduri, Stuart E. Schechter, Manya Sleeper
2014It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception.
Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, Matthew Smith
2014Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings.
Jialiu Lin, Bin Liu, Norman M. Sadeh, Jason I. Hong
2014Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences.
Rick Wash, Emilee J. Rader, Kami Vaniea, Michelle Rizor
2014Parents' and Teens' Perspectives on Privacy In a Technology-Filled World.
Lorrie Faith Cranor, Adam L. Durity, Abigail Marsh, Blase Ur
2014Privacy Attitudes of Mechanical Turk Workers and the U.S. Public.
Ruogu Kang, Stephanie Brown, Laura Dabbish, Sara B. Kiesler
2014Privacy Concerns in Online Recommender Systems: Influences of Control and User Data Input.
Bo Zhang, Na Wang, Hongxia Jin
2014Tenth Symposium on Usable Privacy and Security, SOUPS 2014, Menlo Park, CA, USA, July 9-11, 2014
Lorrie Faith Cranor, Lujo Bauer, Robert Biddle
2014The Effect of Social Influence on Security Sensitivity.
Sauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, Jason I. Hong
2014The Password Life Cycle: User Behaviour in Managing Passwords.
Elizabeth Stobert, Robert Biddle
2014To Authorize or Not Authorize: Helping Users Review Access Policies in Organizations.
Pooya Jaferian, Hootan Rashtian, Konstantin Beznosov
2014To Befriend Or Not? A Model of Friend Request Acceptance on Facebook.
Hootan Rashtian, Yazan Boshmaf, Pooya Jaferian, Konstantin Beznosov
2014Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation.
Stefan Korff, Rainer Böhme
2014Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones.
Hui Xu, Yangfan Zhou, Michael R. Lyu
2014Understanding and Specifying Social Access Control Lists.
Mainack Mondal, Yabing Liu, Bimal Viswanath, Krishna P. Gummadi, Alan Mislove
2014Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences.
Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Lauren Schmidt, Laura Brandimarte, Alessandro Acquisti
2014Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning.
Hazim Almuhimedi, Adrienne Porter Felt, Robert W. Reeder, Sunny Consolvo