| 2015 | "...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices. Iulia Ion, Rob Reeder, Sunny Consolvo |
| 2015 | "I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab. Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
| 2015 | "I'm Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication. Bryan Dosono, Jordan Hayes, Yang Wang |
| 2015 | "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security. Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, Sara B. Kiesler |
| 2015 | "WTH..!?!" Experiences, Reactions, and Expectations Related to Online Privacy Panic Situations. Julio Angulo, Martin Ortlieb |
| 2015 | A Design Space for Effective Privacy Notices. Florian Schaub, Rebecca Balebako, Adam L. Durity, Lorrie Faith Cranor |
| 2015 | A Human Capital Model for Mitigating Security Analyst Burnout. Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Jacob Case, Xinming Ou, Michael Wesch, John McHugh, S. Raj Rajagopalan |
| 2015 | Eleventh Symposium On Usable Privacy and Security, SOUPS 2015, Ottawa, Canada, July 22-24, 2015. Lorrie Faith Cranor, Robert Biddle, Sunny Consolvo |
| 2015 | Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field Study. Yusuf Albayram, Mohammad Maifi Hasan Khan |
| 2015 | Leading Johnny to Water: Designing for Usability and Trust. Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg |
| 2015 | Learning Assigned Secrets for Unlocking Mobile Devices. Stuart E. Schechter, Joseph Bonneau |
| 2015 | On the Impact of Touch ID on iPhone Passcodes. Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, Konstantin Beznosov |
| 2015 | On the Memorability of System-generated PINs: Can Chunking Help? Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda N. Bashir, Konstantin Beznosov |
| 2015 | Security Practices for Households Bank Customers in the Kingdom of Saudi Arabia. Deena Alghamdi, Ivan Flechais, Marina Jirotka |
| 2015 | Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets. Paul Dunphy, Vasilis Vlachokyriakos, Anja Thieme, James Nicholson, John C. McCarthy, Patrick Olivier |
| 2015 | The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords. Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew K. Wright, Shannon Scielzo |
| 2015 | Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users. Rick Wash, Emilee J. Rader |
| 2015 | Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps. Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori |
| 2015 | Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors. John M. Blythe, Lynne M. Coventry, Linda Little |
| 2015 | Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying. Hassan Khan, Urs Hengartner, Daniel Vogel |
| 2015 | Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices. Sarah J. Andrabi, Michael K. Reiter, Cynthia Sturton |
| 2015 | User Perceptions of Sharing, Advertising, and Tracking. Farah Chanchary, Sonia Chiasson |
| 2015 | Where Have You Been? Using Location-Based Security Questions for Fallback Authentication. Alina Hang, Alexander De Luca, Matthew Smith, Michael Richter, Heinrich Hussmann |