SOUPS A

47 papers

YearTitle / Authors
2017"...better to use a lock screen than to worry about saving a few seconds of time": Effect of Fear Appeal in the Context of Smartphone Locking Behavior.
Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Nhan Nguyen
2017"I feel stupid I can't delete...": A Study of Users' Cloud Deletion Practices and Coping Strategies.
Kopo M. Ramokapane, Awais Rashid, Jose M. Such
2017"I want my money back!" Limiting Online Password-Guessing Financially.
Maximilian Golla, Daniel V. Bailey, Markus Dürmuth
2017A Gamified Approach to Improve Users' Memorability of Fall-back Authentication.
Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage
2017A Proposed Visualization for Vulnerability Scan Data.
Stacey Watson, Heather Richter Lipford
2017A Qualitative Investigation of Bank Employee Experiences of Information Security and Phishing.
Dan Conway, Ronnie Taib, Mitch Harris, Kun Yu, Shlomo Berkovsky, Fang Chen
2017A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016.
Peter Mayer, Jan Kirchner, Melanie Volkamer
2017Ask Me Anything: A Conversational Interface to Augment Information Security Workers.
Bobby Filar, Richard Seymour, Matthew Park
2017Augmenting Centralized Password Management with Application-Specific Passwords.
Trevor Smith, Scott Ruoti, Kent E. Seamons
2017Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics.
Heather Crawford, Ebad Ahmadzadeh
2017Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection.
James Nicholson, Lynne M. Coventry, Pam Briggs
2017Comparing Educational Approaches to Secure programming: Tool vs. TA.
Madiha Tabassum, Stacey Watson, Heather Richter Lipford
2017DigiTally: Piloting Offline Payments for Phones.
Khaled Baqer, Ross J. Anderson, Lorna Mutegi, Jeunese A. Payne, Joseph Sevilla
2017Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek
2017End User Security and Privacy Concerns with Smart Homes.
Eric Zeng, Shrirang Mare, Franziska Roesner
2017Exploring decision making with Android's runtime permission dialogs using in-context surveys.
Bram Bonné, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft
2017Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk.
Andrew M'manga, Shamal Faily, John McAlaney, Christopher Williams
2017Formal Mental Models for Inclusive Privacy and Security.
Adam Houser, Matthew L. Bolton
2017Format vs. Content: The Impact of Risk and Presentation on Disclosure Decisions.
Sonam Samat, Alessandro Acquisti
2017How Effective is Anti-Phishing Training for Children?
Elmer Lastdrager, Inés Carvajal Gallardo, Pieter H. Hartel, Marianne Junger
2017Impact of User Characteristics on Attitudes Towards Automatic Mobile Application Updates.
Arunesh Mathur, Marshini Chetty
2017Inclusive persuasion for security software adoption.
Eunjin Jung, Evelyn Y. Ho
2017Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications.
Elham Vaziripour, Justin Wu, Mark O'Neill, Jordan Whitehead, Scott Heidbrink, Kent E. Seamons, Daniel Zappala
2017Key-bored to Tears: The Usability Cost of Character Authentication on Mobile Devices.
Ann-Marie Horcher
2017Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities.
Sonali Tukaram Marne, Mahdi Nasrullah Al-Ameen, Matthew K. Wright
2017Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques.
Christopher Novak, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith
2017New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network.
Kevin Gallagher, Sameer Patil, Nasir D. Memon
2017On the Design of Distributed Adaptive Authentication Systems.
Patricia Arias Cabarcos, Christian Krupitzer
2017Privacy Expectations and Preferences in an IoT World.
Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, Norman M. Sadeh
2017Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase Intentions.
Sonam Samat, Alessandro Acquisti, Linda Babcock
2017Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services.
Jasmine D. Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin R. B. Butler
2017Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics.
Casey Inez Canfield, Alex Davis, Baruch Fischhoff, Alain Forget, Sarah Pearman, Jeremy Thomas
2017Security Developer Studies with GitHub Users: Exploring a Convenience Sample.
Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, Sascha Fahl
2017Security and privacy design considerations for low-literate users in developing regions.
Shrirang Mare, Aditya Vashistha, Richard Anderson
2017Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles.
Cara Bloom, Joshua Tan, Javed Ramjohn, Lujo Bauer
2017Skills and Characteristics of Successful Cybersecurity Advocates.
Julie M. Haney, Wayne G. Lutters
2017Smartwatches Locking Methods: A Comparative Study.
Toan Nguyen, Nasir D. Memon
2017The Shadow Warriors: In the no man's land between industrial control systems and enterprise IT systems.
Alberto Zanutto, Ben Shreeve, Karolina Follis, Jerry S. Busby, Awais Rashid
2017The importance of visibility for folk theories of sensor data.
Emilee J. Rader, Janine Slaker
2017Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017.
2017Touchscreen Biometrics Across Multiple Devices.
Tuan Ngyuen, Jonathan Voris
2017Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences.
Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David A. Wagner, Nathan Good, Jung-Wei Chen
2017Using chatbots against voice spam: Analyzing Lenny's effectiveness.
Merve Sahin, Marc Relieu, Aurélien Francillon
2017Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter?
Yu Pu, Jens Grossklags
2017Victim Privacy in Crowdsourcing Based Public Safety Reporting: A Case Study of LiveSafe.
Huichuan Xia, Yun Huang, Yang Wang
2017Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture.
Scott Ruoti, Tyler Monson, Justin Wu, Daniel Zappala, Kent E. Seamons
2017You Want Me To Do What? A Design Study of Two-Factor Authentication Messages.
Elissa M. Redmiles, Everest Liu, Michelle L. Mazurek