SOUPS 2019 | "I was told to buy a software or lose my computer. I ignored it": A study of ransomware | Camelia Simoiu, Joseph Bonneau, Christopher Gates, Sharad Goel |
SOUPS 2019 | Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines | Frank Li, Lisa Rogers, Arunesh Mathur, Nathan Malkin, Marshini Chetty |
SOUPS 2019 | Privacy and Security Threat Models and Mitigation Strategies of Older Adults | Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, Serge Egelman |
SOUPS 2018 | Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse | Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl |
SOUPS 2018 | Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality | Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, Elissa M. Redmiles |
SOUPS 2018 | "You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography | Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, Norman Makoto Su |
SOUPS 2018 | Informal Support Networks: an investigation into Home Data Security Practices | Norbert Nthala, Ivan Flechais |
SOUPS 2018 | "I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach | Yixin Zou, Abraham H. Mhaidli, Austin McCall, Florian Schaub |
SOUPS 2018 | Security in the Software Development Lifecycle | Hala Assal, Sonia Chiasson |
SOUPS 2018 | Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships | Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong |
SOUPS 2018 | Can Digital Face-Morphs Influence Attitudes and Online Behaviors? | Sonam Samat, Eyal Peer, Alessandro Acquisti |
SOUPS 2018 | "We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products | Julie M. Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman |
SOUPS 2018 | Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking | Arunesh Mathur, Jessica Vitak, Arvind Narayanan, Marshini Chetty |
SOUPS 2018 | User Behaviors and Attitudes Under Password Expiration Policies | Hana Habib, Pardis Emami Naeini, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
SOUPS 2018 | Deception Task Design in Developer Password Studies: Exploring a Student Sample | Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Matthew Smith |
SOUPS 2018 | "It's Scary…It's Confusing…It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security | Julie M. Haney, Wayne G. Lutters |
SOUPS 2018 | Online Privacy and Aging of Digital Artifacts | Reham Ebada Mohamed, Sonia Chiasson |
SOUPS 2018 | "If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration | Ambar Murillo, Andreas Kramm, Sebastian Schnorf, Alexander De Luca |
SOUPS 2018 | Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data | Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, Oxana Comanescu |
SOUPS 2018 | Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing | Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor |
SOUPS 2018 | Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection | James Nicholson, Lynne Coventry, Pam Briggs |
SOUPS 2018 | A Comparative Usability Study of Key Management in Secure Email | Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent Seamons |
SOUPS 2018 | API Blindspots: Why Experienced Developers Write Vulnerable Code | Daniela Seabra Oliveira, Tian Lin, Muhammad Sajidur Rahman, Rad Akefirad, Donovan Ellis, Eliany Perez, Rahul Bobhate, Lois A. DeLong, Justin Cappos, Yuriy Brun |
SOUPS 2018 | Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios | Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer |
SOUPS 2018 | "Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia | Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, Elizabeth Churchill |