| 2016 | "They Keep Coming Back Like Zombies": Improving Software Updating Interfaces. Arunesh Mathur, Josefine Engel, Sonam Sobti, Victoria Chang, Marshini Chetty |
| 2016 | A Study of Authentication in Daily Life. Shrirang Mare, Mary Baker, Jeremy Gummeson |
| 2016 | A Week to Remember: The Impact of Browser Warning Storage Policies. Joel Weinberger, Adrienne Porter Felt |
| 2016 | Addressing Physical Safety, Security, and Privacy for People with Visual Impairments. Tousif Ahmed, Patrick Shaffer, Kay Connelly, David J. Crandall, Apu Kapadia |
| 2016 | An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems. Wei Bai, Moses Namara, Yichen Qian, Patrick Gage Kelley, Michelle L. Mazurek, Doowon Kim |
| 2016 | Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones. Lalit Agarwal, Hassan Khan, Urs Hengartner |
| 2016 | Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, Rahul Telang |
| 2016 | Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online. Ashwini Rao, Florian Schaub, Norman M. Sadeh, Alessandro Acquisti, Ruogu Kang |
| 2016 | Expert and Non-Expert Attitudes towards (Secure) Instant Messaging. Alexander De Luca, Sauvik Das, Martin Ortlieb, Iulia Ion, Ben Laurie |
| 2016 | Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman M. Sadeh, Yuvraj Agarwal, Alessandro Acquisti |
| 2016 | Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate |
| 2016 | How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices. Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman M. Sadeh, Lorrie Faith Cranor, Yuvraj Agarwal |
| 2016 | Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the US. Jeffrey Warshaw, Nina Taft, Allison Woodruff |
| 2016 | Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours. Adam Beautement, Ingolf Becker, Simon Parkin, Kat Krol, M. Angela Sasse |
| 2016 | Rethinking Connection Security Indicators. Adrienne Porter Felt, Robert W. Reeder, Alex Ainslie, Helen Harris, Max Walker, Christopher Thompson, Mustafa Emre Acer, Elisabeth Morant, Sunny Consolvo |
| 2016 | Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users. Sadegh Torabi, Konstantin Beznosov |
| 2016 | Snooping on Mobile Phones: Prevalence and Trends. Diogo Marques, Ildar Muslukhov, Tiago João Guerreiro, Luís Carriço, Konstantin Beznosov |
| 2016 | Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations. Sathya Chandran Sundaramurthy, John McHugh, Xinming Ou, Michael Wesch, Alexandru G. Bardas, S. Raj Rajagopalan |
| 2016 | Twelfth Symposium on Usable Privacy and Security, SOUPS 2016, Denver, CO, USA, June 22-24, 2016 |
| 2016 | Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites. Rick Wash, Emilee J. Rader, Ruthie Berman, Zac Wellmer |
| 2016 | Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices. Katharina Krombholz, Thomas Hupperich, Thorsten Holz |
| 2016 | User Attitudes Toward the Inspection of Encrypted Traffic. Scott Ruoti, Mark O'Neill, Daniel Zappala, Kent E. Seamons |
| 2016 | Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice. Michael Fagan, Mohammad Maifi Hasan Khan |