| 2017 | "...better to use a lock screen than to worry about saving a few seconds of time": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Nhan Nguyen |
| 2017 | "I feel stupid I can't delete...": A Study of Users' Cloud Deletion Practices and Coping Strategies. Kopo M. Ramokapane, Awais Rashid, Jose M. Such |
| 2017 | "I want my money back!" Limiting Online Password-Guessing Financially. Maximilian Golla, Daniel V. Bailey, Markus Dürmuth |
| 2017 | A Gamified Approach to Improve Users' Memorability of Fall-back Authentication. Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage |
| 2017 | A Proposed Visualization for Vulnerability Scan Data. Stacey Watson, Heather Richter Lipford |
| 2017 | A Qualitative Investigation of Bank Employee Experiences of Information Security and Phishing. Dan Conway, Ronnie Taib, Mitch Harris, Kun Yu, Shlomo Berkovsky, Fang Chen |
| 2017 | A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016. Peter Mayer, Jan Kirchner, Melanie Volkamer |
| 2017 | Ask Me Anything: A Conversational Interface to Augment Information Security Workers. Bobby Filar, Richard Seymour, Matthew Park |
| 2017 | Augmenting Centralized Password Management with Application-Specific Passwords. Trevor Smith, Scott Ruoti, Kent E. Seamons |
| 2017 | Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics. Heather Crawford, Ebad Ahmadzadeh |
| 2017 | Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. James Nicholson, Lynne M. Coventry, Pam Briggs |
| 2017 | Comparing Educational Approaches to Secure programming: Tool vs. TA. Madiha Tabassum, Stacey Watson, Heather Richter Lipford |
| 2017 | DigiTally: Piloting Offline Payments for Phones. Khaled Baqer, Ross J. Anderson, Lorna Mutegi, Jeunese A. Payne, Joseph Sevilla |
| 2017 | Diversify to Survive: Making Passwords Stronger with Adaptive Policies. Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek |
| 2017 | End User Security and Privacy Concerns with Smart Homes. Eric Zeng, Shrirang Mare, Franziska Roesner |
| 2017 | Exploring decision making with Android's runtime permission dialogs using in-context surveys. Bram Bonné, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft |
| 2017 | Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk. Andrew M'manga, Shamal Faily, John McAlaney, Christopher Williams |
| 2017 | Formal Mental Models for Inclusive Privacy and Security. Adam Houser, Matthew L. Bolton |
| 2017 | Format vs. Content: The Impact of Risk and Presentation on Disclosure Decisions. Sonam Samat, Alessandro Acquisti |
| 2017 | How Effective is Anti-Phishing Training for Children? Elmer Lastdrager, Inés Carvajal Gallardo, Pieter H. Hartel, Marianne Junger |
| 2017 | Impact of User Characteristics on Attitudes Towards Automatic Mobile Application Updates. Arunesh Mathur, Marshini Chetty |
| 2017 | Inclusive persuasion for security software adoption. Eunjin Jung, Evelyn Y. Ho |
| 2017 | Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications. Elham Vaziripour, Justin Wu, Mark O'Neill, Jordan Whitehead, Scott Heidbrink, Kent E. Seamons, Daniel Zappala |
| 2017 | Key-bored to Tears: The Usability Cost of Character Authentication on Mobile Devices. Ann-Marie Horcher |
| 2017 | Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities. Sonali Tukaram Marne, Mahdi Nasrullah Al-Ameen, Matthew K. Wright |
| 2017 | Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques. Christopher Novak, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith |
| 2017 | New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. Kevin Gallagher, Sameer Patil, Nasir D. Memon |
| 2017 | On the Design of Distributed Adaptive Authentication Systems. Patricia Arias Cabarcos, Christian Krupitzer |
| 2017 | Privacy Expectations and Preferences in an IoT World. Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, Norman M. Sadeh |
| 2017 | Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase Intentions. Sonam Samat, Alessandro Acquisti, Linda Babcock |
| 2017 | Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. Jasmine D. Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin R. B. Butler |
| 2017 | Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics. Casey Inez Canfield, Alex Davis, Baruch Fischhoff, Alain Forget, Sarah Pearman, Jeremy Thomas |
| 2017 | Security Developer Studies with GitHub Users: Exploring a Convenience Sample. Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, Sascha Fahl |
| 2017 | Security and privacy design considerations for low-literate users in developing regions. Shrirang Mare, Aditya Vashistha, Richard Anderson |
| 2017 | Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles. Cara Bloom, Joshua Tan, Javed Ramjohn, Lujo Bauer |
| 2017 | Skills and Characteristics of Successful Cybersecurity Advocates. Julie M. Haney, Wayne G. Lutters |
| 2017 | Smartwatches Locking Methods: A Comparative Study. Toan Nguyen, Nasir D. Memon |
| 2017 | The Shadow Warriors: In the no man's land between industrial control systems and enterprise IT systems. Alberto Zanutto, Ben Shreeve, Karolina Follis, Jerry S. Busby, Awais Rashid |
| 2017 | The importance of visibility for folk theories of sensor data. Emilee J. Rader, Janine Slaker |
| 2017 | Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017. |
| 2017 | Touchscreen Biometrics Across Multiple Devices. Tuan Ngyuen, Jonathan Voris |
| 2017 | Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David A. Wagner, Nathan Good, Jung-Wei Chen |
| 2017 | Using chatbots against voice spam: Analyzing Lenny's effectiveness. Merve Sahin, Marc Relieu, Aurélien Francillon |
| 2017 | Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter? Yu Pu, Jens Grossklags |
| 2017 | Victim Privacy in Crowdsourcing Based Public Safety Reporting: A Case Study of LiveSafe. Huichuan Xia, Yun Huang, Yang Wang |
| 2017 | Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture. Scott Ruoti, Tyler Monson, Justin Wu, Daniel Zappala, Kent E. Seamons |
| 2017 | You Want Me To Do What? A Design Study of Two-Factor Authentication Messages. Elissa M. Redmiles, Everest Liu, Michelle L. Mazurek |