Conferences

Search results

    TitleConferenceSpeaker(s)
    Privacy Mental Models of Electronic Health Records: A German Case StudySOUPS 2023Rebecca Panskus, Max Ninow, Sascha Fahl, Karola Marky
    "Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager SetupSOUPS 2023Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, Sascha Fahl
    GuardLens: Supporting Safer Online Browsing for People with Visual ImpairmentsSOUPS 2023Smirity Kaushik, Natã M. Barbosa, Yaman Yu, Tanusree Sharma, Zachary Kilhoffer, JooYoung Seo, Sauvik Das, Yang Wang
    Data Privacy and Pluralistic IgnoranceSOUPS 2023Emilee Rader
    Prospects for Improving Password SelectionSOUPS 2023Joram Amador, Yiran Ma, Summer Hasama, Eshaan Lumba, Gloria Lee, Eleanor Birrell
    "Is Reporting Worth the Sacrifice of Revealing What I've Sent?": Privacy Considerations When Reporting on End-to-End Encrypted PlatformsSOUPS 2023Leijie Wang, Ruotong Wang, Sterling Williams-Ceci, Sanketh Menda, Amy X. Zhang
    'Give Me Structure': Synthesis and Evaluation of a (Network) Threat Analysis Process Supporting Tier 1 Investigations in a Security Operation CenterSOUPS 2023Leon Kersten, Tom Mulders, Emmanuele Zambon, Chris Snijders, Luca Allodi
    "Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in PakistanSOUPS 2023Afaq Ashraf, - Taha, Nida ul Habib Bajwa, Cornelius J. König, Mobin Javed, Maryam Mustafa
    Youth understandings of online privacy and security: A dyadic study of children and their parentsSOUPS 2023Olivia Williams, Yee-Yin Choong, Kerrianne Buchanan
    Fight Fire with Fire: Hacktivists' Take on Social Media MisinformationSOUPS 2023Filipo Sharevski, Benjamin Kessell
    Exploring the Security Culture of Operational Technology (OT) Organisations: the Role of External Consultancy in Overcoming Organisational BarriersSOUPS 2023Stefanos Evripidou, Uchenna D Ani, Stephen Hailes, Jeremy D McK. Watson
    "There will be less privacy, of course": How and why people in 10 countries expect AI will affect privacy in the futureSOUPS 2023Patrick Gage Kelley, Celestina Cornejo, Lisa Hayes, Ellie Shuo Jin, Aaron Sedley, Kurt Thomas, Yongwei Yang, Allison Woodruff
    What can central bank digital currency designers learn from asking potential users?SOUPS 2023Svetlana Abramova, Rainer Böhme, Helmut Elsinger, Helmut Stix, Martin Summer
    An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers', Parents', and Bystanders' PerspectivesSOUPS 2023Elmira Deldari, Diana Freed, Julio Poveda, Yaxing Yao
    Dissecting Nudges in Password Managers: Simple Defaults are PowerfulSOUPS 2023Samira Zibaei, Amirali Salehi-Abari, Julie Thorpe
    Towards Usable Security Analysis Tools for Trigger-Action ProgrammingSOUPS 2023McKenna McCall, Eric Zeng, Faysal Hossain Shezan, Mitchell Yang, Lujo Bauer, Abhishek Bichhawat, Camille Cobb, Limin Jia, Yuan Tian
    "Nobody's Happy": Design Insights from Privacy-Conscious Smart Home Power Users on Enhancing Data Transparency, Visibility, and ControlSOUPS 2023Sunyup Park, Anna Lenhart, Michael Zimmer, Jessica Vitak
    Evaluating User Behavior in Smartphone Security: A Psychometric PerspectiveSOUPS 2023Hsiao-Ying Huang, Soteris Demetriou, Muhammad Hassan, Güliz Seray Tuncay, Carl A. Gunter, Masooda Bashir
    Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective of the End UserSOUPS 2023Hussein Hazazi, Mohamed Shehab
    Distrust of big tech and a desire for privacy: Understanding the motivations of people who have voluntarily adopted secure emailSOUPS 2023Warda Usman, Jackie Hu, McKynlee Wilson, Daniel Zappala
    Weaponizing Technology: Examining the Importance of Privacy in an Era of Unprecedented Digital SurveillanceSOUPS 2023Sapna Khatri
    Evaluating the Impact of Community Oversight for Managing Mobile Privacy and SecuritySOUPS 2023Mamtaj Akter, Madiha Tabassum, Nazmus Sakib Miazi, Leena Alghamdi, Jess Kropczynski, Pamela J. Wisniewski, Heather Lipford
    Checking, nudging or scoring? Evaluating e-mail user security toolsSOUPS 2023Sarah Y. Zheng, Ingolf Becker
    On the Recruitment of Company Developers for Security Studies: Results from a Qualitative Interview StudySOUPS 2023Raphael Serafini, Marco Gutfleisch, Stefan Albert Horstmann, Alena Naiakshina
    Tangible 2FA – An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor AuthenticationSOUPS 2023Mark Turner, Martin Schmitz, Morgan Masichi Bierey, Mohamed Khamis, Karola Marky

Pages