SOUPS A

23 papers

YearTitle / Authors
2015"...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices.
Iulia Ion, Rob Reeder, Sunny Consolvo
2015"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab.
Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
2015"I'm Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication.
Bryan Dosono, Jordan Hayes, Yang Wang
2015"My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security.
Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, Sara B. Kiesler
2015"WTH..!?!" Experiences, Reactions, and Expectations Related to Online Privacy Panic Situations.
Julio Angulo, Martin Ortlieb
2015A Design Space for Effective Privacy Notices.
Florian Schaub, Rebecca Balebako, Adam L. Durity, Lorrie Faith Cranor
2015A Human Capital Model for Mitigating Security Analyst Burnout.
Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Jacob Case, Xinming Ou, Michael Wesch, John McHugh, S. Raj Rajagopalan
2015Eleventh Symposium On Usable Privacy and Security, SOUPS 2015, Ottawa, Canada, July 22-24, 2015.
Lorrie Faith Cranor, Robert Biddle, Sunny Consolvo
2015Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field Study.
Yusuf Albayram, Mohammad Maifi Hasan Khan
2015Leading Johnny to Water: Designing for Usability and Trust.
Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg
2015Learning Assigned Secrets for Unlocking Mobile Devices.
Stuart E. Schechter, Joseph Bonneau
2015On the Impact of Touch ID on iPhone Passcodes.
Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, Konstantin Beznosov
2015On the Memorability of System-generated PINs: Can Chunking Help?
Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda N. Bashir, Konstantin Beznosov
2015Security Practices for Households Bank Customers in the Kingdom of Saudi Arabia.
Deena Alghamdi, Ivan Flechais, Marina Jirotka
2015Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets.
Paul Dunphy, Vasilis Vlachokyriakos, Anja Thieme, James Nicholson, John C. McCarthy, Patrick Olivier
2015The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords.
Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew K. Wright, Shannon Scielzo
2015Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users.
Rick Wash, Emilee J. Rader
2015Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps.
Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori
2015Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors.
John M. Blythe, Lynne M. Coventry, Linda Little
2015Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying.
Hassan Khan, Urs Hengartner, Daniel Vogel
2015Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices.
Sarah J. Andrabi, Michael K. Reiter, Cynthia Sturton
2015User Perceptions of Sharing, Advertising, and Tracking.
Farah Chanchary, Sonia Chiasson
2015Where Have You Been? Using Location-Based Security Questions for Fallback Authentication.
Alina Hang, Alexander De Luca, Matthew Smith, Michael Richter, Heinrich Hussmann