You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Investigative Journalism in the Digital Age: Privacy, Security and the MediaSOUPS 2019Jennifer Valentino-DeVries
    Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record LinkageSOUPS 2019Hye-Chung Kum, Eric D. Ragan, Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, Cason Schmit
    Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional AspectsSOUPS 2019Oshrat Ayalon, Eran Toch
    From Usability to Secure Computing and Back AgainSOUPS 2019Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia
    Personal Information Leakage by Abusing the GDPR 'Right of Access'SOUPS 2019Mariano Di Martino, Pieter Robyns, Winnie Weyts, Peter Quax, Wim Lamotte, Ken Andries
    "We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer RisksSOUPS 2019Abraham H. Mhaidli, Yixin Zou, Florian Schaub
    A Self-Report Measure of End-User Security Attitudes (SA-6)SOUPS 2019Cori Faklaris, Laura A. Dabbish, Jason I. Hong
    Cooperative Privacy and Security: Learning from People with Visual Impairments and Their AlliesSOUPS 2019Jordan Hayes, Smirity Kaushik, Charlotte Emily Price, Yang Wang
    An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 WebsitesSOUPS 2019Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, Florian Schaub
    The Effect of Entertainment Media on Mental Models of Computer SecuritySOUPS 2019Kelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Yasmin Abdi, Richard Roberts, Michelle L. Mazurek
    Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile DevicesSOUPS 2019Lukas Mecke, Sarah Delgado Rodriguez, Daniel Buschek, Sarah Prange, Florian Alt
    Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen DevicesSOUPS 2019Lukas Mecke, Daniel Buschek, Mathias Kiermeier, Sarah Prange, Florian Alt
    Why people (don’t) use password managers effectivelySOUPS 2019Shikun Aerin Zhang, Sarah Pearman, Lujo Bauer, Nicolas Christin
    A Typology of Perceived Triggers for End-User Security and Privacy BehaviorsSOUPS 2019Sauvik Das, Laura A. Dabbish, Jason I. Hong
    The Fog of Warnings: How Non-essential Notifications Blur with Security WarningsSOUPS 2019Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson
    “There is nothing that I need to keep secret”: Sharing Practices and Concerns of Wearable Fitness DataSOUPS 2019Abdulmajeed Alqhatani, Heather Richter Lipford
    Certified Phishing: Taking a Look at Public Key Certificates of Phishing WebsitesSOUPS 2019Ulrike Meyer, Vincent Drury
    Usability Smells: An Analysis of Developers’ Struggle With Crypto LibrariesSOUPS 2019Nikhil Patnaik, Joseph Hallett, Awais Rashid
    Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience SamplingSOUPS 2019Stéphane Ciolino, Simon Parkin, Paul Dunphy
    System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall InterfacesSOUPS 2019Artem Voronkov, Leonardo A. Martucci, Stefan Lindskog
    "I don't own the data": End User Perceptions of Smart Home Device Data Practices and RisksSOUPS 2019Madiha Tabassum, Tomasz Kosinski, Heather Richter Lipford
    "Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in SignalSOUPS 2019Justin Wu, Cyrus Gattrell, Devon Howard, Jake Tyler, Elham Vaziripour, Daniel Zappala, Kent Seamons
    A Usability Study of Five Two-Factor Authentication MethodsSOUPS 2019Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, Kent Seamons
    More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal AssistantsSOUPS 2019Noura Abdi, Kopo M. Ramokapane, Jose M. Such
    "I was told to buy a software or lose my computer. I ignored it": A study of ransomwareSOUPS 2019Camelia Simoiu, Joseph Bonneau, Christopher Gates, Sharad Goel