SOUPS A

23 papers

YearTitle / Authors
2016"They Keep Coming Back Like Zombies": Improving Software Updating Interfaces.
Arunesh Mathur, Josefine Engel, Sonam Sobti, Victoria Chang, Marshini Chetty
2016A Study of Authentication in Daily Life.
Shrirang Mare, Mary Baker, Jeremy Gummeson
2016A Week to Remember: The Impact of Browser Warning Storage Policies.
Joel Weinberger, Adrienne Porter Felt
2016Addressing Physical Safety, Security, and Privacy for People with Visual Impairments.
Tousif Ahmed, Patrick Shaffer, Kay Connelly, David J. Crandall, Apu Kapadia
2016An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
Wei Bai, Moses Namara, Yichen Qian, Patrick Gage Kelley, Michelle L. Mazurek, Doowon Kim
2016Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones.
Lalit Agarwal, Hassan Khan, Urs Hengartner
2016Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes.
Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, Rahul Telang
2016Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online.
Ashwini Rao, Florian Schaub, Norman M. Sadeh, Alessandro Acquisti, Ruogu Kang
2016Expert and Non-Expert Attitudes towards (Secure) Instant Messaging.
Alexander De Luca, Sauvik Das, Martin Ortlieb, Iulia Ion, Ben Laurie
2016Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions.
Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman M. Sadeh, Yuvraj Agarwal, Alessandro Acquisti
2016Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate
2016How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices.
Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman M. Sadeh, Lorrie Faith Cranor, Yuvraj Agarwal
2016Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the US.
Jeffrey Warshaw, Nina Taft, Allison Woodruff
2016Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.
Adam Beautement, Ingolf Becker, Simon Parkin, Kat Krol, M. Angela Sasse
2016Rethinking Connection Security Indicators.
Adrienne Porter Felt, Robert W. Reeder, Alex Ainslie, Helen Harris, Max Walker, Christopher Thompson, Mustafa Emre Acer, Elisabeth Morant, Sunny Consolvo
2016Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users.
Sadegh Torabi, Konstantin Beznosov
2016Snooping on Mobile Phones: Prevalence and Trends.
Diogo Marques, Ildar Muslukhov, Tiago João Guerreiro, Luís Carriço, Konstantin Beznosov
2016Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations.
Sathya Chandran Sundaramurthy, John McHugh, Xinming Ou, Michael Wesch, Alexandru G. Bardas, S. Raj Rajagopalan
2016Twelfth Symposium on Usable Privacy and Security, SOUPS 2016, Denver, CO, USA, June 22-24, 2016
2016Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites.
Rick Wash, Emilee J. Rader, Ruthie Berman, Zac Wellmer
2016Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices.
Katharina Krombholz, Thomas Hupperich, Thorsten Holz
2016User Attitudes Toward the Inspection of Encrypted Traffic.
Scott Ruoti, Mark O'Neill, Daniel Zappala, Kent E. Seamons
2016Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice.
Michael Fagan, Mohammad Maifi Hasan Khan