SOUPS A

31 papers

YearTitle / Authors
2025"Hello, is this Anna?": Unpacking the Lifecycle of Pig-Butchering Scams.
Rajvardhan Oak, Zubair Shafiq
2025"TikTok, Do Your Thing": User Reactions to Social Surveillance in the Public Sphere.
Meira Gilbert, Miranda Wei, Lindah Kotut
2025"We are not Future-ready": Understanding AI Privacy Risks and Existing Mitigation Strategies from the Perspective of AI Developers in Europe.
Alexandra Klymenko, Stephen Meisenbacher, Patrick Gage Kelley, Sai Teja Peddinti, Kurt Thomas, Florian Matthes
2025"You go now! No trouble!" Understanding the Offboarding Process in Companies from an IT Security Perspective.
Christina Detsika, Timo Jagusch, Nora Weidner, Larissa Weir, Florin Martius, Christian Tiefenau
2025Adopting AI to Protect Industrial Control Systems: Assessing Challenges and Opportunities from the Operators' Perspective.
Clement Fung, Eric Zeng, Lujo Bauer
2025Between Court Orders and Platform Policies: Understanding Law Enforcement and Meta Interactions in Addressing Non-Consensual Image Disclosure Abuse.
Amna Batool, Kentaro Toyama
2025Can You Walk Me Through It? Explainable SMS Phishing Detection using LLM-based Agents.
Yizhu Wang, Haoyu Zhai, Chenkai Wang, Qingying Hao, Nick A. Cohen, Roopa Foulger, Jonathan A. Handler, Gang Wang
2025Design and Evaluation of Privacy-Preserving Protocols for Agent-Facilitated Mobile Money Services in Kenya.
Karen Sowon, Collins W. Munyendo, Lily Klucinec, Eunice Maingi, Gerald Suleh, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye
2025Do You See If I See? Investigating Reciprocity in Interpersonal Access-Control Settings (in the U.S.).
Nathan Malkin, Alan F. Luo, Evan J. Zhao, Michelle L. Mazurek
2025From TOTPs to Security Keys: Studying the Reality of Passwordless FIDO2 Authentication With PIN and Biometrics in a Corporate Environment.
Leona Lassak, Nicklas Lindemann, Marvin Kowalewski
2025How Predatory Monetization Designs Manifest in Child-Friendly Video Games.
Qiurong Song, ZiNan Zhang, Rie Helene (Lindy) Hernandez, Xinning Gui, Yubo Kou
2025I never reuse passwords! Development and Validation of a Security and Privacy Social Desirability Scale (SP-SDS) for end users without a background in computer science.
Laura Marie Abels, Matthew Smith, Anna-Marie Ortloff
2025Integrating Large Language Models into Security Incident Response.
Diana Kramer, Lambert Rosique, Ajay Narotam, Elie Bursztein, Patrick Gage Kelley, Kurt Thomas, Allison Woodruff
2025Language as Lure: A Naturalistic Study on Pasifika Phishing Susceptibility.
Eric Spero, Isa Seow, Lucas Betts, Eddie Fuatimau, Robert Biddle, Danielle M. Lottridge, Giovanni Russello
2025Measuring NIST Authentication Standards Compliance by Higher Education Institutions.
Noah J. Apthorpe, Boen Beavers, Yan Shvartzshnaider, Brett Frischmann
2025Minoritised Ethnic People's Security and Privacy Concerns and Responses towards Essential Online Services.
Aunam Quyoum, Mark Wong, Sebati Ghosh, Siamak F. Shahandashti
2025Misuse, Misreporting, Misinterpretation of Statistical Methods in Usable Privacy and Security Papers.
Jenny Tang, Lujo Bauer, Nicolas Christin
2025More than Usability: Differential Access to Digital Security and Privacy.
Annalina Buckmann, Jan Magnus Nold, Yasemin Acar, Yixin Zou
2025Playing in the Sandbox: A Study on the Usability of Seccomp.
Maysara Alhindi, Joseph Hallett
2025Replication: "No one can hack my mind" - 10 years later: An update and outlook on experts' and non-experts' security practices and advice.
Anna-Marie Ortloff, Jenny Tang, Arthi Arumugam, Daniel Huschina, Lisa Geierhaas, Florin Martius, Luisa Jansen, Kolja von der Twer, Lilly Jungbluth, Matthew Smith
2025Safety Perceptions of Generative AI Conversational Agents: Uncovering Perceptual Differences in Trust, Risk, and Fairness.
Jan Tolsdorf, Alan F. Luo, Monica Kodwani, Junho Eum, Mahmood Sharif, Michelle L. Mazurek, Adam J. Aviv
2025Shiny Shells, Rusty Cores: A Crowdsourced Security Evaluation of Integrated Web Browsers.
Gertjan Franken, Pieter Claeys, Tom van Goethem, Lieven Desmet
2025Smart Spaces, Private Lives: A Culturally Grounded Examination of Privacy Tensions in Smart Homes.
Yara Alsiyat, Yuanhaur Chang, Ning Zhang, Ivan Flechais
2025Spy-oT: Understanding How Users Learn to Use Internet of Things Devices For Abusive Purposes.
Kieron Ivy Turk, Alice Hutchings
2025The more accounts I use, the less I have to think': A Longitudinal Study on the Usability of Password Managers for Novice Users.
Patricia Arias Cabarcos, Peter Mayer
2025Trust-Enabled Privacy: Social Media Designs to Support Adolescent User Boundary Regulation.
JaeWon Kim, Robert Wolfe, Ramya Bhagirathi Subramanian, Mei-Hsuan Lee, Jessica Colnago, Alexis Hiniker
2025Twenty-First Symposium on Usable Privacy and Security, SOUPS 2025, Seattle, WA, USA, August 10-12, 2025.
Patrick Gage Kelley, Mainack Mondal, Kami Vaniea
2025Unpacking the Social and Emotional Dimensions of Security and Privacy User Engagement.
Nina Gerber, Verena Zimmermann, Alexandra von Preuschen, Karen Renaud
2025User Understandings of Technical Terms in App Privacy Labels.
Ishika Keswani, Kerick Walker, Adrian Clement, Eusila Kitur, Nannapas Wonghirundacha, Ryan Aubrey, Vivien Song, Eleanor Birrell
2025Victims, Vigilantes, and Advice Givers: An Analysis of Scam-Related Discourse on Reddit.
Rajvardhan Oak, Zubair Shafiq
2025Youth-Centered GAI Risks (YAIR): A Taxonomy of Generative AI Risks from Empirical Data.
Yaman Yu, Yiren Liu, Jacky Zhang, Yun Huang, Yang Wang