


default search action
15th SOUPS @ USENIX Security Symposium 2019: Santa Clara, CA, USA
- Heather Richter Lipford:
Fifteenth Symposium on Usable Privacy and Security, SOUPS 2019, Santa Clara, CA, USA, August 11-13, 2019. USENIX Association 2019
Populations and Scales
- Jordan Hayes, Smirity Kaushik, Charlotte Emily Price, Yang Wang:
Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies. - Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, Serge Egelman:
Privacy and Security Threat Models and Mitigation Strategies of Older Adults. - Oshrat Ayalon, Eran Toch:
Evaluating Users' Perceptions about a System's Privacy: Differentiating Social and Institutional Aspects. - Cori Faklaris, Laura A. Dabbish, Jason I. Hong:
A Self-Report Measure of End-User Security Attitudes (SA-6).
Security Behaviors and Experiences
- Kelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Yasmin Abdi, Richard Roberts, Michelle L. Mazurek:
The Effect of Entertainment Media on Mental Models of Computer Security. - Sauvik Das, Laura A. Dabbish, Jason I. Hong:
A Typology of Perceived Triggers for End-User Security and Privacy Behaviors. - Karoline Busse
, Julia Schäfer, Matthew Smith
:
Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice. - Justin Wu, Cyrus Gattrell, Devon Howard, Jake Tyler, Elham Vaziripour, Daniel Zappala, Kent E. Seamons:
"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal. - Camelia Simoiu, Joseph Bonneau, Christopher Gates, Sharad Goel:
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware.
New Paradigms
- Hye-Chung Kum, Eric D. Ragan, Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, Cason Schmit:
Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage. - Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia:
From Usability to Secure Computing and Back Again. - Ulrike Meyer, Vincent Drury:
Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites.
Developers and Sysadmins
- Abraham H. Mhaidli, Yixin Zou, Florian Schaub:
"We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks. - Nikhil Patnaik, Joseph Hallett, Awais Rashid:
Usability Smells: An Analysis of Developers' Struggle With Crypto Libraries. - Artem Voronkov, Leonardo A. Martucci, Stefan Lindskog:
System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces. - Frank Li, Lisa Rogers, Arunesh Mathur, Nathan Malkin, Marshini Chetty:
Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines.
Authentication
- Lukas Mecke, Sarah Delgado Rodriguez, Daniel Buschek, Sarah Prange, Florian Alt:
Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile Devices. - Lukas Mecke, Daniel Buschek, Mathias Kiermeier, Sarah Prange, Florian Alt:
Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen Devices. - Shikun Zhang, Sarah Pearman, Lujo Bauer, Nicolas Christin:
Why people (don't) use password managers effectively. - Stéphane Ciolino, Simon Parkin, Paul Dunphy:
Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling. - Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, Kent E. Seamons
:
A Usability Study of Five Two-Factor Authentication Methods.
Personal Privacy
- Mariano Di Martino, Pieter Robyns, Winnie Weyts, Peter Quax, Wim Lamotte, Ken Andries:
Personal Information Leakage by Abusing the GDPR 'Right of Access'. - Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, Florian Schaub:
An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites. - Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson:
The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings.
Wearables and Smart Homes
- Abdulmajeed Alqhatani, Heather Richter Lipford:
"There is nothing that I need to keep secret": Sharing Practices and Concerns of Wearable Fitness Data. - Madiha Tabassum, Tomasz Kosinski, Heather Richter Lipford:
I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks. - Noura Abdi, Kopo M. Ramokapane, Jose M. Such:
More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.